76.0 - Updated on 11-20-2024 by Eric Taylor (elt143)
75.0 - Updated on 11-14-2024 by Eric Taylor (elt143)
74.0 - Updated on 10-15-2024 by Eric Taylor (elt143)
73.0 - Updated on 10-01-2024 by Eric Taylor (elt143)
72.0 - Updated on 09-30-2024 by Eric Taylor (elt143)
71.0 - Updated on 09-09-2024 by Eric Taylor (elt143)
70.0 - Updated on 08-20-2024 by Eric Taylor (elt143)
69.0 - Updated on 08-20-2024 by Eric Taylor (elt143)
68.0 - Updated on 08-20-2024 by Eric Taylor (elt143)
67.0 - Updated on 08-12-2024 by Eric Taylor (elt143)
66.0 - Updated on 05-29-2024 by Eric Taylor (elt143)
65.0 - Updated on 05-13-2024 by Eric Taylor (elt143)
64.0 - Updated on 05-07-2024 by Eric Taylor (elt143)
63.0 - Updated on 04-09-2024 by Eric Taylor (elt143)
62.0 - Updated on 03-25-2024 by Eric Taylor (elt143)
61.0 - Updated on 03-14-2024 by Eric Taylor (elt143)
60.0 - Updated on 01-11-2024 by Eric Taylor (elt143)
59.0 - Updated on 01-11-2024 by Eric Taylor (elt143)
58.0 - Updated on 12-12-2023 by Eric Taylor (elt143)
57.0 - Updated on 10-02-2023 by Eric Taylor (elt143)
56.0 - Updated on 06-22-2023 by Eric Taylor (elt143)
55.0 - Updated on 05-04-2023 by Tom Bayly (txb151)
54.0 - Updated on 03-16-2023 by Eric Taylor (elt143)
53.0 - Updated on 02-02-2023 by Eric Taylor (elt143)
52.0 - Updated on 02-02-2023 by Eric Taylor (elt143)
51.0 - Updated on 11-14-2022 by Eric Taylor (elt143)
50.0 - Updated on 08-16-2022 by Eric Taylor (elt143)
49.0 - Updated on 08-16-2022 by Eric Taylor (elt143)
48.0 - Updated on 08-16-2022 by Eric Taylor (elt143)
47.0 - Updated on 02-18-2022 by Michael Giornesto (mcg12)
46.0 - Updated on 02-18-2022 by Michael Giornesto (mcg12)
45.0 - Updated on 02-14-2022 by Gregory Fox (gdf24)
44.0 - Updated on 01-28-2022 by Michael Giornesto (mcg12)
43.0 - Updated on 01-28-2022 by Gregory Fox (gdf24)
42.0 - Updated on 05-13-2021 by Gregory Fox (gdf24)
41.0 - Updated on 03-31-2021 by Michael Giornesto (mcg12)
40.0 - Updated on 03-31-2021 by Michael Giornesto (mcg12)
39.0 - Updated on 03-11-2021 by Gregory Fox (gdf24)
38.0 - Updated on 02-23-2021 by Michael Giornesto (mcg12)
37.0 - Updated on 01-20-2021 by Michael Giornesto (mcg12)
36.0 - Updated on 01-15-2021 by Patty Rees (plr14)
35.0 - Updated on 01-14-2021 by Patty Rees (plr14)
34.0 - Updated on 01-04-2021 by Michael Giornesto (mcg12)
33.0 - Updated on 12-14-2020 by Michael Giornesto (mcg12)
32.0 - Updated on 10-29-2020 by Kem Hartley (kdh162)
31.0 - Updated on 10-16-2020 by Michael Giornesto (mcg12)
30.0 - Updated on 10-15-2020 by Michael Giornesto (mcg12)
29.0 - Updated on 09-03-2020 by Michael Giornesto (mcg12)
28.0 - Updated on 08-11-2020 by Michael Giornesto (mcg12)
27.0 - Updated on 08-11-2020 by Michael Giornesto (mcg12)
26.0 - Updated on 08-10-2020 by Michael Giornesto (mcg12)
25.0 - Updated on 08-04-2020 by Kem Hartley (kdh162)
24.0 - Updated on 08-03-2020 by Tom Bayly (txb151)
Overview
Penn State will test and categorize each release of the GlobalProtect VPN agent software to verify and rate the compatibility with the on-premise VPN implementation.
Your use of the GlobalProtect service will not work until your workgroup or unit has been provisioned.
Contact your local IT to determine your GlobalProtect access
|
Five Rating Categories
- PSU Preferred - This is the preferred or best recommended agent version based on compatibility of configured features, known bugs, and known security advisories.
- Not Recommended - All PSU implemented features are not supported by this version of the agent. However, this version will not be blocked or restricted from use. The Penn State Service-Desk will not provide VPN support to systems running these agent version. The agent must be upgraded to a "PSU Preferred" version to receive tech-support.
- Not Permitted - This version of the agent may be blocked or restricted from accessing PSU resources while connected to the VPN system.
- Under Review - This is likely a new release of the software that has not been fully tested or not enough user validation has confirmed all required functions.
- No Release - Agent software is not published for this version.
To download the preferred GlobalProtect agent version, please click on the linked agent version number in the leftmost column.
Agent Version |
Windows |
Mac |
Linux |
5.1.6 |
Under Review
|
Under Review
|
Under Review
|
5.1.5 |
PSU Preferred
|
PSU Preferred
- Microsft Defender ATP anti-maleware is identified, but no RTP information is reported.
|
PSU Preferred
- preferred for gui versions
- preferred for non-gui versions
|
5.1.4 |
Not Recommended
- Microsft Defender ATP anti-maleware is identified, but no signature date or RTP information is reported.
|
Not Recommended
- Microsft Defender ATP anti-maleware is identified, but no signature date or RTP information is reported.
|
Not Recommended
- Newer preferred release available
|
5.1.3 |
Not Permitted
|
Not Recommended
- Microsoft Defender-ATP definition date is not correctly identified which caused the device to fail the HIP check.
|
Not Recommended
- GPC-10649
- GlobalProtect failed to send an XML compliant HIP report to the firewall
|
5.1.2 |
No Release
|
No Release
|
Not Recommended
- Newer preferred release available
|
5.1.1 |
Not Permitted
|
Not Permitted
|
Not Recommended
- Newer preferred release available
|
5.1.0 |
Not Permitted
|
Not Permitted
|
Not Permitted
|
5.0.9 |
Not Permitted
|
Not Recommended
- Microsoft Defender-ATP definition date is not correctly identified which caused the device to fail the HIP check.
|
Not Recommended
- later version recommended for non-gui versions
- no gui option available
|
5.0.8 |
Not Permitted
- Windows Defender-ATP definition date is not correctly identified which caused the device to fail the HIP check.
- CVE-2020-1987
|
Not Permitted
- GP Agent does not correctly identify SEP RTP status, resulting in a HIP block action
- Microsoft Defender-ATP definition date is not correctly identified which caused the device to fail the HIP check.
- CVE-2020-1987
|
Not Permitted
|
5.0.7 |
Not Permitted
- Windows Defender-ATP not identified in anti-malware HIP category resulting in a HIP block.
- CVE-2020-1987
|
Not Permitted
- GP Agent does not correctly identify SEP RTP status, resulting in a HIP block action
- Microsoft Defender-ATP not identified in anti-malware HIP category resulting in a HIP block.
- CVE-2020-1987
|
Not Permitted
|
5.0.6 |
Not Permitted
|
Not Permitted
|
Not Permitted
|
5.0.5 |
Not Permitted
|
Not Permitted
|
Not Permitted
|
5.0.4 |
Not Permitted
- CVE-2020-1987
- CVE-2020-1988
|
Not Permitted
- CVE-2020-1987
- CVE-2020-1976
- CVE-2019-17436
|
Not Permitted
- CVE-2019-17436
- CVE-2020-1987
|
5.0.3 |
Not Permitted
- CVE-2020-1987
- CVE-2020-1988
|
Not Permitted
- CVE-2020-1987
- CVE-2020-1976
- CVE-2019-17436
|
Not Permitted
- CVE-2019-17436
- CVE-2020-1987
|
5.0.2 |
Not Permitted
- CVE-2020-1987
- CVE-2020-1988
|
Not Permitted
- CVE-2020-1987
- CVE-2020-1976
- CVE-2019-17436
|
Not Permitted
- CVE-2019-17436
- CVE-2020-1987
|
5.0.1 |
Not Permitted
- CVE-2020-1987
- CVE-2020-1988
|
Not Permitted
- CVE-2020-1987
- CVE-2020-1976
- CVE-2019-17436
|
Not Permitted
- CVE-2019-17436
- CVE-2020-1987
|
5.0.0 |
Not Permitted
- CVE-2020-1987
- CVE-2020-1988
|
Not Permitted
- CVE-2020-1987
- CVE-2020-1976
- CVE-2019-17436
|
Not Permitted
- CVE-2019-17436
- CVE-2020-1987
|
4.X and earlier |
Not Permitted
|
Not Permitted
|
Not Permitted
|
To Get Help
If you have questions or experience any difficulties, use any of the following methods to contact the IT Service Desk for help:
Links