<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MS Active Directory Security Group Changes Not Applying over VPN w/ prelogon in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481404#M104165</link>
    <description>&lt;P&gt;Thanks for sharing your experience. Yes I did verify that prelogon was passing traffic during the logon in firewall logs. Also we are using the same subnet on the gateway for prelogon and users so the tunnel only gets renamed to the user. It could be something to do with our workstation build I don't know. Palo support did see that there is a wait for network connectivity during the boot process. Maybe networking is taking a little longer to initialize? It's good to know that it's functioning for others.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Apr 2022 17:34:28 GMT</pubDate>
    <dc:creator>Kevin_McCall</dc:creator>
    <dc:date>2022-04-20T17:34:28Z</dc:date>
    <item>
      <title>MS Active Directory Security Group Changes Not Applying over VPN w/ prelogon</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481359#M104158</link>
      <description>&lt;P&gt;Our organization has been struggling with getting MS AD security group changes to apply over VPN w/ prelogon enabled for a long period of time now. I have had support tickets in with Palo support and MS support. Palo support has determined via Globalprotect logs, prelogon appears to be functioning properly and no traffic for this function is being denied by prelogon/user firewall security policies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sometimes we have noticed if the user reboots twice the security group changes are then reflected on the user's PC. It hasn't been a great experience. I am curious if others are having the same headaches with gpo/security group changes that apply during boot with prelogon. Is it solvable or just something we must live with? We are configured with SAML authentication prelogon always on. Prelogon authenticates via a cookie.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 16:13:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481359#M104158</guid>
      <dc:creator>Kevin_McCall</dc:creator>
      <dc:date>2022-04-20T16:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: MS Active Directory Security Group Changes Not Applying over VPN w/ prelogon</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481390#M104159</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27890"&gt;@Kevin_McCall&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This is working perfectly fine throughout the environments I manage, however whenever folks want an always-on connection we utilize certificates not SAML. Have you verified through the local client side logs and the firewall traffic logs that pre-logon is&amp;nbsp;&lt;EM&gt;actually&amp;nbsp;&lt;/EM&gt;connected and passing traffic when your experiencing the issue? As long as pre-logon is actually working, and you're allowing the traffic, you shouldn't run into any issues with this at all.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 17:11:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481390#M104159</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2022-04-20T17:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: MS Active Directory Security Group Changes Not Applying over VPN w/ prelogon</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481404#M104165</link>
      <description>&lt;P&gt;Thanks for sharing your experience. Yes I did verify that prelogon was passing traffic during the logon in firewall logs. Also we are using the same subnet on the gateway for prelogon and users so the tunnel only gets renamed to the user. It could be something to do with our workstation build I don't know. Palo support did see that there is a wait for network connectivity during the boot process. Maybe networking is taking a little longer to initialize? It's good to know that it's functioning for others.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 17:34:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/481404#M104165</guid>
      <dc:creator>Kevin_McCall</dc:creator>
      <dc:date>2022-04-20T17:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: MS Active Directory Security Group Changes Not Applying over VPN w/ prelogon</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/485456#M104527</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Would you mind sharing with me your configuration so that I may mimic what is working in your environment without giving any sensitive information? That may help us determine if it is an issue with our workstation or Globalprotect configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2022 15:39:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-active-directory-security-group-changes-not-applying-over-vpn/m-p/485456#M104527</guid>
      <dc:creator>Kevin_McCall</dc:creator>
      <dc:date>2022-05-06T15:39:43Z</dc:date>
    </item>
  </channel>
</rss>

