<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Complex User-ID Scenario... Ideas?  Solutions? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20754#M15160</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking over the agent documentation again, I don't see any way you can prevent this behavior in the current tools.&amp;nbsp; The agent is directly reading the AD login information and using this to update the ip address associations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some LDAP filtering ability on the firewall configuration for the purpose of browsing group names and contents.&amp;nbsp; But there does not seem to be any similar browse on the Agent to restrict updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially, what you need is a way to exclude a portion of the AD tree from logging ip address updates at login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you need to contact your Sales team and put in a feature request for this function.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 02 Feb 2014 14:15:25 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2014-02-02T14:15:25Z</dc:date>
    <item>
      <title>Complex User-ID Scenario... Ideas?  Solutions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20753#M15159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey all -&lt;/P&gt;&lt;P&gt;I work for a very large global organization.&amp;nbsp; Our design for User-ID is such that some locations can use the UID Agent, others can't - and so they use the Agentless, on-box UID.&amp;nbsp; One issue we have is that we have thousands of what we call "common" and "job" (or, process) accounts that some people use to access remote machines from their machine, map drives to remote machines with, and run local background processes with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that when those accounts authenticate, to AD it's a successful login from the user's computer.&amp;nbsp; That being said, it overwrites their User-to-IP mapping in the firewall and things that they should have access to, they no longer have access to because the account that the Firewall thinks they're logged in as is blocked.&amp;nbsp; Since the UID Agent / Agentless does not accept / process wildcards, that put us into a management nightmare scenario...From everything I can find, just about our only option is to create a seriously large list of these accounts and maintain it.&amp;nbsp; It won't be so difficult from the UID Agent perspective because it's just a txt file with one entry per line, however, with many of our locations being Agentless, it presents one heck of a nightmare. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is - has anyone else come upon a similar scenario?&amp;nbsp; And, if so, how are you handling it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone else have any other suggestions?&amp;nbsp; I thought that the Agent / Agentless could ignore users based on a group that I tell it to ignore but that also does not appear to be the case.. (One thought was to put all these accounts in a common group to use for this purpose).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a bunch!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 17:58:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20753#M15159</guid>
      <dc:creator>MRosloniec</dc:creator>
      <dc:date>2014-01-30T17:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Complex User-ID Scenario... Ideas?  Solutions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20754#M15160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looking over the agent documentation again, I don't see any way you can prevent this behavior in the current tools.&amp;nbsp; The agent is directly reading the AD login information and using this to update the ip address associations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some LDAP filtering ability on the firewall configuration for the purpose of browsing group names and contents.&amp;nbsp; But there does not seem to be any similar browse on the Agent to restrict updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially, what you need is a way to exclude a portion of the AD tree from logging ip address updates at login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you need to contact your Sales team and put in a feature request for this function.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Feb 2014 14:15:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20754#M15160</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-02-02T14:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: Complex User-ID Scenario... Ideas?  Solutions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20755#M15161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the description, this sounds like it may be an issue with monitoring server session reads. Just so I understand the flow, is the following correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;User is logged into their workstation, and is correctly mapped to the IP of that workstation. &lt;/LI&gt;&lt;LI&gt;User maps a drive to a share on a server using different credentials and the mapping is updated based on that information causing an issue with the rule set.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above case, you can disable server session reads to resolve the issue. Please let me know if there is more to this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2014 07:01:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20755#M15161</guid>
      <dc:creator>cstancill</dc:creator>
      <dc:date>2014-02-03T07:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Complex User-ID Scenario... Ideas?  Solutions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20756#M15162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct - we have server session read enabled.&amp;nbsp; Really I was enabling this to help provide more coverage (in case someone slipped past the AD logon) but, seeing as how it can cause this problem as I have outlined it may be best to disable it.&amp;nbsp; Thanks for the suggestion!&amp;nbsp; I will disable it and test it out some more.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2014 16:53:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20756#M15162</guid>
      <dc:creator>MRosloniec</dc:creator>
      <dc:date>2014-02-03T16:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Complex User-ID Scenario... Ideas?  Solutions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20757#M15163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Matt,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got a similar scenario at one of my customers. Did disabling the server session read help you, or did you come up with a different solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, I also want to ignore events from admin and service accounts that actually creates entries in the security logs on the DC, so disabling server session read won't be a good enough solution for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any input would be appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Tor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Mar 2015 11:56:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/20757#M15163</guid>
      <dc:creator>torm</dc:creator>
      <dc:date>2015-03-10T11:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Complex User-ID Scenario... Ideas?  Solutions?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/77747#M42698</link>
      <description>&lt;P&gt;The 7.0.3 agent now supports wildcards in the ignore_user_list.&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2016 19:03:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/complex-user-id-scenario-ideas-solutions/m-p/77747#M42698</guid>
      <dc:creator>gwesley</dc:creator>
      <dc:date>2016-05-09T19:03:59Z</dc:date>
    </item>
  </channel>
</rss>

