<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apple MAC's and User-ID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17928#M13054</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Aditi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any future feature "request" that would provide a local User-ID agent. I think this would help may Administrators of PAN Firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Sep 2013 15:19:28 GMT</pubDate>
    <dc:creator>UA_MC</dc:creator>
    <dc:date>2013-09-04T15:19:28Z</dc:date>
    <item>
      <title>Apple MAC's and User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17926#M13052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We recently implemented a pair of PA-3020 in an Active/Passive cluster.&lt;/P&gt;&lt;P&gt;I have been working on USER-ID, but have an issue. There are about 2500 Apple MAC computers&lt;/P&gt;&lt;P&gt;on site. They are binded to AD , even if an AD user uses logs in to an Apple MAC there are no MS events &lt;/P&gt;&lt;P&gt;in the security logs to forward to the User-ID agent. &lt;/P&gt;&lt;P&gt;Most all of the Apple Mac’s don’t mount to any shared MS AD shares.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is what am I missing or how can I get the User-ID to work with Apple MAC’s?&lt;/P&gt;&lt;P&gt;Also it would be great if there were a “local” agent installer for both MAC and Windows clients.&lt;/P&gt;&lt;P&gt;We could install them silently and a managed install. Then let the physical machine report to the Firewall of the current user and IP address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 14:32:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17926#M13052</guid>
      <dc:creator>UA_MC</dc:creator>
      <dc:date>2013-09-04T14:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: Apple MAC's and User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17927#M13053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Goodmorning! These are the available options that are available for MAC users to provide their User-ID info to the firewall: &lt;/P&gt;&lt;P&gt;1) Captive Portal (&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1159"&gt;https://live.paloaltonetworks.com/docs/DOC-1159&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;2) Install a client that will do AD login&lt;/P&gt;&lt;P&gt;3) Make them connect via SSL VPN and surf through the VPN.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;4) User ID API integration using Syslog (&lt;/SPAN&gt;&lt;A class="jive-link-wiki-small" data-containerid="2010" data-containertype="14" data-objectid="1936" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1936"&gt;https://live.paloaltonetworks.com/docs/DOC-1936&lt;/A&gt;&lt;SPAN&gt;) -&amp;nbsp; You would take login events on your OpenDirectory server and syslog these events. Parse through the data and use the API to send this info to the User-ID Agent for ip-mappings.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, user-id agent can also monitor Exchange server, so if the mac users are able to login to Outlook to create login events, we should be able to get the mapping that way as well. Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Aditi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 14:54:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17927#M13053</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2013-09-04T14:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Apple MAC's and User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17928#M13054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Aditi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any future feature "request" that would provide a local User-ID agent. I think this would help may Administrators of PAN Firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 15:19:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17928#M13054</guid>
      <dc:creator>UA_MC</dc:creator>
      <dc:date>2013-09-04T15:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: Apple MAC's and User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17929#M13055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said the Macs were bound to AD: &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;"They are binded to AD , even if an AD user uses logs in to an Apple MAC there are no MS events &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;in the security logs to forward to the User-ID agent." So, how are the Macs bound to AD? IF the users authenticate to AD there should be a logon event and if not, you may have to enable logging levels to show those logon events through: &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2801"&gt;https://live.paloaltonetworks.com/docs/DOC-2801&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;These are then read according to:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1262"&gt;https://live.paloaltonetworks.com/docs/DOC-1262&lt;/A&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;You may also find &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-5662"&gt;https://live.paloaltonetworks.com/docs/DOC-5662&lt;/A&gt; helpful.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Sep 2013 17:09:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17929#M13055</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2013-09-04T17:09:05Z</dc:date>
    </item>
    <item>
      <title>Re: Apple MAC's and User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17930#M13056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry this is so late, this issue was resolved. Prior to me working here the MAC admins were given an AD / OU to Bind the Apple MAC OSX machine to (CN=MAC,DC=xx,DC=xxx).&lt;/P&gt;&lt;P&gt;For some reason if the MAC's are not in the default CN=Computers,DC=xx,DC=xxx OU windows security logs will never populate?&lt;/P&gt;&lt;P&gt;After we move all of the AD objects "Apple MAC's" to the correct OU (CN=Computers,DC=xx,DC=xxx), security event logs started working and populating PAN-User-ID.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 13:19:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/apple-mac-s-and-user-id/m-p/17930#M13056</guid>
      <dc:creator>UA_MC</dc:creator>
      <dc:date>2014-08-28T13:19:25Z</dc:date>
    </item>
  </channel>
</rss>

