<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Guide and Video Demo: User-ID on Cloud NGFW for Azure in Cloud NGFW for Azure Articles</title>
    <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/guide-and-video-demo-user-id-on-cloud-ngfw-for-azure/ta-p/589026</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_User-ID-CNGFW-Azure_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60249i1F2E07E049AF2EED/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_User-ID-CNGFW-Azure_palo-alto-networks.jpg" alt="Title_User-ID-CNGFW-Azure_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;About This Guide&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Cloud NGFW&lt;/FONT&gt;&lt;/STRONG&gt; is the industry’s only machine learning (ML)-powered NGFW delivered as a cloud-native service on &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Azure&lt;/STRONG&gt;&lt;/FONT&gt;. With Cloud NGFW, you can run more apps securely at cloud speed and cloud-scale with an actual cloud-native experience. You get to experience the best of both worlds with natively integrated network security delivered as a service on Azure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The user identity, as opposed to an IP address, is an integral component of an effective security infrastructure. Knowing who is using each of the applications on your network, and who may have transmitted a threat or is transferring files, can strengthen security policies and reduce incident response times. User-ID™, a standard feature on the Palo Alto Networks firewall, enables you to leverage user information stored in a wide range of repositories.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this guide, we will discuss how to enable user-id on Cloud NGFW for Azure and use user-id in policy definition and traffic monitoring.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Sample Topology&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 1_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60223i7BE0B30B51AC9473/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 1_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 1_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;As per above test topology we have a Windows server with Active Directory configured. There are two Test Users added to the active directory. Within the user subnet there are two user machines(Testuser1 and Testuser2) that will be used to generate user traffic.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud NGFW is integrated with Azure Virtual WAN.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;User-ID with PanOS Integrated Agent&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H3&gt;&lt;STRONG&gt;Prerequisite&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Configure the &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/user-id/map-ip-addresses-to-users/create-a-dedicated-service-account-for-the-user-id-agent" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;service&lt;/SPAN&gt; &lt;SPAN&gt;account&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; with Remote Management User and CIMV2 privileges for the server you want to monitor&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/user-id/map-ip-addresses-to-users/configure-server-monitoring-using-winrm" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Configure server monitoring using WinRM&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; over HTTPS with Basic Authentication&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Create Test users and Groups on Windows server&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Security Policy on Cloud NGFW to allow communication with LDAP/Windows server with Active directory&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Import Root Certificate (from Windows Server) on to Panorama&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Import the root certificate onto Panorama as shown below. This is the CA certificate that's available on Windows server acting as Active directory.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 2_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60224i3AEF1C557C0E0DAD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 2_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 2_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Add Certificate Profile&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;After importing the root certificate in the above step, now add a certificate profile using the certificate imported as shown below&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 3_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60225i6C61C8C1AAD75523/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 3_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 3_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Add Certificate Profile to User-ID Connection Security&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Now add this certificate profile to User-ID connection security as shown below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need to click on the Gear icon to add a user-id Certificate Profile.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_3" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 4_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60226i20210404C8E85D89/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 4_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 4_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Configure Server Monitor account&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Login to Panorama and configure server monitor account as shown in below screenshot.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Go to &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;DEVICE &amp;gt; User Identification &amp;gt; User Mapping&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; and click on Gear icon to configure Server Monitor Account.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Over here you need to provide the user name and password details of the service account that you have created on Windows server as part of prerequisites.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_4" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 5_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60227iF231B03BE6A21F96/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 5_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 5_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Configure Server Monitoring with WinRM-HTTPS Transport Protocol&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Configure server monitoring by going to &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;DEVICE &amp;gt; User Identification &amp;gt; User Mapping &amp;gt; Server Monitoring&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Over here you need to specify the Type as Microsoft Active Directory, Transport Protocol as WinRM-HTTPS and the Network Address as your Windows server address where you have an active directory configured.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Commit and push the configuration&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 6_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60228i71CF8BBD4A878D26/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 6_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 6_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Enable User-ID on Cloud NGFW&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Now you can go ahead and enable User-ID on Cloud NGFW network interfaces.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Since cloud ngfw is a service and we don't have any control over network configuration on Cloud NGFW, you can override Private and Public zones as shown below and enable User-ID&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_6" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 7_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60229i8D83FEC88A6606E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 7_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 7_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;To &lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_7" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 8_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60230iB1F458CD62ECF696/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 8_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 8_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Similarly override Public zone as well and enable User Identification.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Configure Service Route to Active Directory LDAP Server&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;In order to reach from Cloud NGFW to Active Directory we are now going to add a service route as shown below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Go to &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;Device &amp;gt; Setup &amp;gt; Services&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; and click on “Service Route Configuration” to add route to LDAP server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_8" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 9_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60231i9120FFFFE951D493/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 9_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 9_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;On clicking Service Route Configuration, you will be presented with the below mentioned screen where you need to select “Custom” and select LDAP service to add a route through Loopback.3 interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cloud NGFW internally uses Loopback.3 as a source interface to talk to Active Directory.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 10_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 952px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60232i3C51058B50F669E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 10_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 10_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now add a service route based on Destination. Where the destination IP address Active Directory address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Select the source interface as Loopback.3 interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Commit and Push the configuration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 11_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60233iA6022CCBF636DB29/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 11_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 11_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 12_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60234i9D929AEA467694F4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 12_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 12_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Configure LDAP Server Profile&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Configure LDAP server profile as shown below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Go to &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;DEVICE &amp;gt; Server Profiles &amp;gt; LDAP &lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;and click on Add to add LDAP server profile&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_12" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 13_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60235i4978051306D6B4EB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 13_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 13_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can start with providing Profile Name and add Server list where you will specify your active directory server IP address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now to fill in Server settings, you need to get Base DN and Bind DN from your active directory as shown below.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;On your windows server, open ADSI edit app as shown below&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_13" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 14_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60236iB968E1C106E09A33/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 14_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 14_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You will be presented with below screen where you can select the username of the windows server to copy Bind DN details&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_14" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 15_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60237i459DAC0383946024/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 15_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 15_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use the copied Bind DN and and Base DN as part of server settings as shown below. Key in the password of your windows server and click on OK to add LDAP server profile&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_15" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 16_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60238i32CAF95CCEE8995C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 16_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 16_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Configure Group Mapping Settings&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;In order to configure Group mapping you need to go to User Identification section as shown below and click on Add&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_16" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 17_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60240iA33E45E9C23B6E07/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 17_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 17_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Select the server profile created in above step to add Group mapping as shown below&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_17" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 18_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60241iD5B21EDDEB21EABD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 18_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 18_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Configure User-ID Master Device with Cloud NGFW Device Group&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Go to your Cloud NGFW device group as shown below. You will need to select the backend instances of cloud NGFW(it will be 3 or more) by enabling the checkbox against the name of the instances&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now enable “User ID Master Device” radio button and select one of the instance from the drop down to act as User ID master device&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_18" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 19_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60242iD38F087F9DA7F2D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 19_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 19_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Commit and Push the configuration&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;User Traffic Test Through Cloud NGFW&lt;/STRONG&gt;&lt;/H3&gt;
&lt;H5&gt;&amp;nbsp;&lt;/H5&gt;
&lt;H4&gt;&lt;STRONG&gt;Validate Testuser1 Traffic&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;As per Test topology we have Two users(Testuser1 and Testuser2). You will now be able to define security policies based on users.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let's try to add a security policy to block Linkedin for Testuser2 and allow for other users. As shown below&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_19" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 20_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60243i423E2E5814F9828A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 20_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 20_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Lets now login to Testuser1 and see if he is able to access LinkedIn and other websites&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you can see in the below screenshot, &lt;/SPAN&gt;&lt;STRONG&gt;Testuser1 &lt;/STRONG&gt;&lt;SPAN&gt;was able to access LinkedIn and other websites&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_20" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 21_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60244i5BD79A04640C4916/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 21_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 21_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Validate the same on the Panorama Monitoring page. You can see that the LinkedIn and twitter applications that were accessed by testuser1 was hitting AllowALL rule and allowed&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_21" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 22_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60245i16D1A988D7315E8E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 22_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 22_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Validate Testuser2 Traffic&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;As per Security policy defined, Testuser2 was blocked from accessing LinkedIn.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let's now try login to Testuser2 machine and access the websites (LinkedIn and Twitter)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As you can see in the screenshot below, Testuser2 was not able to access Linkedin but was able to access twitter.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Lets see the reason for that on the Panorama monitoring page.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditorrpegada_22" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 23_User-ID-CNGFW-Azure_palo-alto-networks.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60246i81C6BC98274BF6CC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 23_User-ID-CNGFW-Azure_palo-alto-networks.png" alt="Fig 23_User-ID-CNGFW-Azure_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This confirms that Cloud NGFW for Azure was able to help with user based policy definition and monitoring.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;VIDEO DEMO&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-6354465637112w600h338r363" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6354465637112" data-account="6058004142001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058004142001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-6354465637112w600h338r363');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://live.paloaltonetworks.com/t5/video/gallerypage/video-id/6354465637112"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 07 Jun 2024 17:59:25 GMT</pubDate>
    <dc:creator>rpegada</dc:creator>
    <dc:date>2024-06-07T17:59:25Z</dc:date>
    <item>
      <title>Guide and Video Demo: User-ID on Cloud NGFW for Azure</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/guide-and-video-demo-user-id-on-cloud-ngfw-for-azure/ta-p/589026</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In this guide, we will discuss how to enable user-id on Cloud NGFW for Azure and use user-id in policy definition and traffic monitoring.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_User-ID-CNGFW-Azure_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60247i48525908227CED8B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_User-ID-CNGFW-Azure_palo-alto-networks.jpg" alt="Title_User-ID-CNGFW-Azure_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 17:59:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-ngfw-for-azure-articles/guide-and-video-demo-user-id-on-cloud-ngfw-for-azure/ta-p/589026</guid>
      <dc:creator>rpegada</dc:creator>
      <dc:date>2024-06-07T17:59:25Z</dc:date>
    </item>
  </channel>
</rss>

