<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User identification and WinRM on HTTP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481965#M104226</link>
    <description>&lt;P&gt;Hi Reaper, thank you for your reply.&lt;/P&gt;&lt;P&gt;I have to understand how to manage certs on domain controllers.&lt;/P&gt;&lt;P&gt;PAN-OS Administrator’s Guide explain how to obtain cert thumb but using only one server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing is that the guide say&lt;/P&gt;&lt;P&gt;"WinRM with Kerberos supports the aes128-cts-hmac-sha1-96 and aes256-cts-hmac-sha1-96 ciphers. If the server you want to monitor uses RC4, you must download the Windows update and disable RC4 for Kerberos in the registry settings of the server you want to monitor."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reading on internet, is not suggested to disable&amp;nbsp;RC4 for Kerberos because could be some problems with clients.&lt;/P&gt;&lt;P&gt;However NGFW is working fine. The problem is only the event viewer of domain controllers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll try to understand how to manage the certs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Fri, 22 Apr 2022 13:43:29 GMT</pubDate>
    <dc:creator>ConfindustriaBG</dc:creator>
    <dc:date>2022-04-22T13:43:29Z</dc:date>
    <item>
      <title>User identification and WinRM on HTTP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481674#M104193</link>
      <description>&lt;P&gt;Hi to all, before to write i red some post here on the community and i just configured my NGFW and windows domain controllers.&lt;/P&gt;&lt;P&gt;Becuase i have every 3 sec an alert about "The server-side authentication level policy does not allow the user AAA\BBB SID (XXX) from address Y.Y.Y.Y activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application." i modified the server monitoring setting changing from WMI to WinRM-HTTP.&lt;/P&gt;&lt;P&gt;On the firewall interface i have all the domain controllers in connected status and, looking on monitor logs, i can see users id.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that on Event Viewer of domain controllers keep to see the error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please someone can help me?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 14:19:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481674#M104193</guid>
      <dc:creator>ConfindustriaBG</dc:creator>
      <dc:date>2022-04-21T14:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: User identification and WinRM on HTTP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481928#M104222</link>
      <description>&lt;P&gt;are you able to try WinRM-HTTPS ?&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 12:41:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481928#M104222</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2022-04-22T12:41:05Z</dc:date>
    </item>
    <item>
      <title>Re: User identification and WinRM on HTTP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481965#M104226</link>
      <description>&lt;P&gt;Hi Reaper, thank you for your reply.&lt;/P&gt;&lt;P&gt;I have to understand how to manage certs on domain controllers.&lt;/P&gt;&lt;P&gt;PAN-OS Administrator’s Guide explain how to obtain cert thumb but using only one server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing is that the guide say&lt;/P&gt;&lt;P&gt;"WinRM with Kerberos supports the aes128-cts-hmac-sha1-96 and aes256-cts-hmac-sha1-96 ciphers. If the server you want to monitor uses RC4, you must download the Windows update and disable RC4 for Kerberos in the registry settings of the server you want to monitor."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reading on internet, is not suggested to disable&amp;nbsp;RC4 for Kerberos because could be some problems with clients.&lt;/P&gt;&lt;P&gt;However NGFW is working fine. The problem is only the event viewer of domain controllers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll try to understand how to manage the certs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 13:43:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/481965#M104226</guid>
      <dc:creator>ConfindustriaBG</dc:creator>
      <dc:date>2022-04-22T13:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: User identification and WinRM on HTTP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/482034#M104232</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167651"&gt;@ConfindustriaBG&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It appears that you are running into this problem -&amp;gt; &lt;A href="https://docs.microsoft.com/en-us/answers/questions/564347/server-2019-update-kb5005568-sept-2021-forcing-new.html" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/answers/questions/564347/server-2019-update-kb5005568-sept-2021-forcing-new.html&lt;/A&gt;.&amp;nbsp; Notice that this thread said that the registry changes specified here -&amp;gt; &lt;A href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c&lt;/A&gt; do not work.&amp;nbsp; The security feature seems to have been implemented prematurely before the fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had 1 client face this issue, and I recommended the Windows agent instead of agentless User-ID.&amp;nbsp; We have not tested it yet, but it makes sense it will fix the annoying logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&amp;nbsp; So you are getting the same error with WinRM?&amp;nbsp; I guess changing the protocol is not a fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit 2:&amp;nbsp; Backing out update KB5005568 could also be a fix if allowed by the security team.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit 3: &amp;nbsp;The registry change works after June 14, 2022 as specified in the KB. &amp;nbsp;This feature will be removed at&amp;nbsp;&lt;SPAN&gt;March 14, 2023. &amp;nbsp;So will be the ability to back out the update.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2022 18:25:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/482034#M104232</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-08-16T18:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: User identification and WinRM on HTTP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/482572#M104297</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;, thank you for your reply.&lt;/P&gt;&lt;P&gt;I'll try to install the agent on one of the Domain Controller and I'll let you know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ciao,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;</description>
      <pubDate>Tue, 26 Apr 2022 08:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/482572#M104297</guid>
      <dc:creator>ConfindustriaBG</dc:creator>
      <dc:date>2022-04-26T08:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: User identification and WinRM on HTTP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/483036#M104322</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;, just installed ID Agent. Now the log of domain controllers is clean!.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks and have a nice day!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ciao&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 06:54:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identification-and-winrm-on-http/m-p/483036#M104322</guid>
      <dc:creator>ConfindustriaBG</dc:creator>
      <dc:date>2022-04-27T06:54:13Z</dc:date>
    </item>
  </channel>
</rss>

