<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prevent Credential Phishing with UPN (userPrincipalName) in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/506986#M183</link>
    <description>&lt;P&gt;Hi World,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm have my first contact with this&amp;nbsp;Prevent Credential Phishing feature. With the option "IP User", because UserID Mapping is already in place, i'm able to detect sAMAccountName Username submissions. But a lot of phishing sites are focused on the UPN, but the UPN username filed submission is not detected by the firewall.&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;sAMAccountName&lt;/SPAN&gt; is our primary Username in the group mapping settings and alternate Username 1 is the UPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If possible how can we detect username fields submissions with UPN or &lt;SPAN class=""&gt;sAMAccountName. Perhaps it is possible with Domain Credential Filter setting, but we do not have an RODC at the moment, but if it is the only option to cover both username types, the i'm also happy to know that.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I hope somebody can help, the PAN documentation does not cover this topic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Kind regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2022 09:14:41 GMT</pubDate>
    <dc:creator>fhu_omi</dc:creator>
    <dc:date>2022-06-29T09:14:41Z</dc:date>
    <item>
      <title>Prevent Credential Phishing with UPN (userPrincipalName)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/506986#M183</link>
      <description>&lt;P&gt;Hi World,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm have my first contact with this&amp;nbsp;Prevent Credential Phishing feature. With the option "IP User", because UserID Mapping is already in place, i'm able to detect sAMAccountName Username submissions. But a lot of phishing sites are focused on the UPN, but the UPN username filed submission is not detected by the firewall.&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;sAMAccountName&lt;/SPAN&gt; is our primary Username in the group mapping settings and alternate Username 1 is the UPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If possible how can we detect username fields submissions with UPN or &lt;SPAN class=""&gt;sAMAccountName. Perhaps it is possible with Domain Credential Filter setting, but we do not have an RODC at the moment, but if it is the only option to cover both username types, the i'm also happy to know that.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I hope somebody can help, the PAN documentation does not cover this topic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Kind regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 09:14:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/506986#M183</guid>
      <dc:creator>fhu_omi</dc:creator>
      <dc:date>2022-06-29T09:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent Credential Phishing with UPN (userPrincipalName)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/509638#M230</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/173884"&gt;@fhu_omi&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Have you consider the option to create additional Group-Mapping profile with UPN as primary username.&lt;/P&gt;
&lt;P&gt;And configure Credential Protection with "User Group Mapping" setting.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 16:49:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/509638#M230</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-07-22T16:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Prevent Credential Phishing with UPN (userPrincipalName)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/511839#M273</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this does not work see kb &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFQCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFQCA0&lt;/A&gt; is written: &lt;STRONG style="box-sizing: border-box; font-weight: bold; color: #16325c; font-family: 'Salesforce Sans', Arial, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; letter-spacing: normal; orphans: 2; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"&gt;&lt;SPAN&gt;When multiple group-mappings are configured with same base dn or ldap server, each group-mapping must include non-overlapping groups i.e include group list must not have any common group.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But for test purpose, you need to considering, that not every web serivce is protected by the user credential protection. If the traffic is classified as one of the following services, then user credential prevention does not pop in:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/trusted-app-ids-that-skip-credential-submission-detection/ta-p/183595" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/customer-resources/trusted-app-ids-that-skip-credential-submission-detection/ta-p/183595&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;i test on facebook login site, which is protected by the pan user cred prevention. i have a UPN estuser1@testdomain.com and SAM testuser1.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;And PAN blocks as soon the string testuser1 is seen in a username field:&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;testuser1 -&amp;gt; detected&lt;/P&gt;
&lt;P data-unlink="true"&gt;testuser1@ -&amp;gt; detected&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;A href="mailto:testuser1@testdomain.com" target="_blank" rel="noopener"&gt;testuser1@testdomain.com&lt;/A&gt; -&amp;gt; detected&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;A href="mailto:testuser1@blabla.com" target="_blank" rel="noopener"&gt;testuser1@blabla.com&lt;/A&gt; -&amp;gt; detected&lt;/P&gt;
&lt;P data-unlink="true"&gt;testuser12 -&amp;gt; not detected&lt;/P&gt;
&lt;P data-unlink="true"&gt;testuser12@ -&amp;gt; not detected&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;i looks like, the domain is not checked for this Group Mapping credential submit method.&lt;/P&gt;
&lt;P&gt;I need now to setup a RODC to check the behaviour with the Domain Credential Filter method.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 13:35:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/prevent-credential-phishing-with-upn-userprincipalname/m-p/511839#M273</guid>
      <dc:creator>fhu_omi</dc:creator>
      <dc:date>2022-08-15T13:35:19Z</dc:date>
    </item>
  </channel>
</rss>

