<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The mechanism of agentless user-id between firewall and monitored server. in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-mechanism-of-agentless-user-id-between-firewall-and/m-p/540515#M1188</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I will do my best to answer your questions:&lt;/P&gt;
&lt;P lang="zh-CN"&gt;&lt;STRONG&gt;1) When querying, does PA first pull the security event log of AD to PA's local location and then check again.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI lang="zh-CN"&gt;The palo alto searches the logs for the events and then creates a mapping of user-id to IP address, it thes uses the mapping for current and future lookups until they timeout (configurable):&amp;nbsp;
&lt;UL&gt;
&lt;LI lang="zh-CN"&gt;&lt;SPAN&gt;The event IDs for the required events are 4768 (Authentication Ticket Granted), 4769 (Service Ticket Granted), 4770 (Ticket Granted Renewed), and 4624 (Logon Success).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P lang="zh-CN"&gt;&lt;STRONG&gt;2) If it is an action to pull AD logs to the local location, how much log volume does pa pull at a time (defined by the number of log entries or time period).&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI lang="zh-CN"&gt;This one I dont know but think it will look past the configured 'timeout', ie if its set to 1 hour, its not going to look at logs older than 1 hour. But the agent check every hour by default and can be changed. Mine is set to 5 minutes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Also here is an article with a bunch of links just for user-id:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5bCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5bCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Fri, 28 Apr 2023 21:00:50 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2023-04-28T21:00:50Z</dc:date>
    <item>
      <title>The mechanism of agentless user-id between firewall and monitored server.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-mechanism-of-agentless-user-id-between-firewall-and/m-p/540417#M1186</link>
      <description>&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;The customer wants to know the query mechanism of agentless user-id. I can see the following description from the documentation.&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;With server monitoring a User-ID agent—either a Windows-based agent running on a domain server in your network, or the PAN-OS integrated User-ID agent running on the firewall—monitors the security event logs for specified Microsoft Exchange Servers, Domain Controllers, or Novell eDirectory servers for login events. For example, in an AD environment, you can configure the User-ID agent to monitor the security logs for Kerberos ticket grants or renewals, Exchange server access (if configured), and file and print service connections. For these events to be recorded in the security log, the AD domain must be configured to log successful account login events. In addition, because users can log in to any of the servers in the domain, you must set up server monitoring for all servers to capture all user login events.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&lt;STRONG&gt;However, the customer asked two questions. I did not find the answers.&amp;nbsp;Can you help answer.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&lt;STRONG&gt;1) When querying, does PA first pull the security event log of AD to PA's local location and then check again. &lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&lt;STRONG&gt;2) If it is an action to pull AD logs to the local location, how much log volume does pa pull at a time (defined by the number of log entries or time period).&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;" lang="zh-CN"&gt;&lt;STRONG&gt;&lt;LI-PRODUCT title="User-ID" id="User-ID"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 04:10:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-mechanism-of-agentless-user-id-between-firewall-and/m-p/540417#M1186</guid>
      <dc:creator>wxiao</dc:creator>
      <dc:date>2023-04-28T04:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: The mechanism of agentless user-id between firewall and monitored server.</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-mechanism-of-agentless-user-id-between-firewall-and/m-p/540515#M1188</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I will do my best to answer your questions:&lt;/P&gt;
&lt;P lang="zh-CN"&gt;&lt;STRONG&gt;1) When querying, does PA first pull the security event log of AD to PA's local location and then check again.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI lang="zh-CN"&gt;The palo alto searches the logs for the events and then creates a mapping of user-id to IP address, it thes uses the mapping for current and future lookups until they timeout (configurable):&amp;nbsp;
&lt;UL&gt;
&lt;LI lang="zh-CN"&gt;&lt;SPAN&gt;The event IDs for the required events are 4768 (Authentication Ticket Granted), 4769 (Service Ticket Granted), 4770 (Ticket Granted Renewed), and 4624 (Logon Success).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P lang="zh-CN"&gt;&lt;STRONG&gt;2) If it is an action to pull AD logs to the local location, how much log volume does pa pull at a time (defined by the number of log entries or time period).&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI lang="zh-CN"&gt;This one I dont know but think it will look past the configured 'timeout', ie if its set to 1 hour, its not going to look at logs older than 1 hour. But the agent check every hour by default and can be changed. Mine is set to 5 minutes.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Also here is an article with a bunch of links just for user-id:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5bCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5bCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2023 21:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/the-mechanism-of-agentless-user-id-between-firewall-and/m-p/540515#M1188</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-04-28T21:00:50Z</dc:date>
    </item>
  </channel>
</rss>

