<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Defender for Identity VPN log integration in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/543530#M4050</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I would also like more information on this being a Microsoft Defender for Identity and Palo Alto Networks GlobalProtect VPN customer.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Ryan&lt;/P&gt;</description>
    <pubDate>Fri, 26 May 2023 16:54:18 GMT</pubDate>
    <dc:creator>rlewandowski</dc:creator>
    <dc:date>2023-05-26T16:54:18Z</dc:date>
    <item>
      <title>Defender for Identity VPN log integration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/508921#M2981</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;Has anyone been able to configure a PA firewall to forward Radius messages to a MS Defender for Identity sensor as per&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/defender-for-identity/vpn-integration" target="_blank"&gt;Microsoft Defender for Identity VPN integration in Microsoft 365 Defender | Microsoft Docs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are using Azure AD for Global Protect authentication, so not sure that it's possible to send to Radius if not using it to authenticate?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Paul.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 04:02:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/508921#M2981</guid>
      <dc:creator>pfox001</dc:creator>
      <dc:date>2022-07-14T04:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: Defender for Identity VPN log integration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/543530#M4050</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I would also like more information on this being a Microsoft Defender for Identity and Palo Alto Networks GlobalProtect VPN customer.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Ryan&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2023 16:54:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/543530#M4050</guid>
      <dc:creator>rlewandowski</dc:creator>
      <dc:date>2023-05-26T16:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Defender for Identity VPN log integration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/543568#M4051</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/139596"&gt;@rlewandowski&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;This wouldn't be configured directly on the firewall. FR1109 is the feature request to support accounting directly on the firewall, but it isn't implemented yet. You'll want to either have your RADIUS server that you're authenticating against send accounting messages where you need it, or alternatively you could setup your syslog server to parse the firewall's GlobalProtect authentication events and send the accounting messages to your Defender for Identity sensor.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2023 22:35:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/defender-for-identity-vpn-log-integration/m-p/543568#M4051</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-05-26T22:35:30Z</dc:date>
    </item>
  </channel>
</rss>

