<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RDP and the PAN-Agent in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22421#M16347</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it's collecting the logon information from the client side, not the server side, in AD. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri, Verdana, Helvetica, Arial;"&gt;I imagine that it’s coming from the way Terminal Services Client 6.0 send the credentials first before letting you log into the server. I think 5 would bring up the console, and then allow you to login.&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Feb 2011 18:56:25 GMT</pubDate>
    <dc:creator>mharding</dc:creator>
    <dc:date>2011-02-09T18:56:25Z</dc:date>
    <item>
      <title>RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22414#M16340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm noticing that when a user connects to a server using RDP with a different username, the PAN-Agent is reading that username and associating it the user's computer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For instance, a programmer named 'jdoe' connects to a web server from his PC using IP address 172.16.3.3 using the username 'webadmin'. The traffic logs now read that 'webadmin' is logged on to 172.16.3.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is anyone else having this problem?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 17:21:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22414#M16340</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-02-01T17:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22415#M16341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pan Agent picks up logon events from the domain controller security event log. So if your Windows environment is somehow showing user "webadmin" instead of "jdoe" then you should first investigate the DC security event logs to verify that this is occurring and then investigate the root cause of that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this isn't the case then you have a mystery that should probably be resolved with a support case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 20:11:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22415#M16341</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-02-01T20:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22416#M16342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We noticed exact the same issue some days ago.. Very annoying and i'm afraid it can this issue will not be solved quickly since the Pan-agent is reading some log types of the dc security logs , i guess.&lt;/P&gt;&lt;P&gt;Anyone who can confirm this ? Is PA working on this ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 20:58:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22416#M16342</guid>
      <dc:creator>OCDBE</dc:creator>
      <dc:date>2011-02-01T20:58:46Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22417#M16343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it is valid in the event log. I noticed it on my Mac using RDP also. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought the NetBios probes would re-query the workstation, but this is not the case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 21:55:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22417#M16343</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-02-01T21:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22418#M16344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The NetBios probe should query the workstation every 20 minutes (default) and re-map the user-to-ip-mapping if warranted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The real question here is why is your Windows environment showing a logon to your user's PC from the webadmin user?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 21:58:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22418#M16344</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-02-01T21:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22419#M16345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's an example from one of our Server 2008 R2 DCs when using MS-RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Log Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security&lt;/P&gt;&lt;P&gt;Source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Microsoft-Windows-Security-Auditing&lt;/P&gt;&lt;P&gt;Date:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2/1/2011 3:59:30 PM&lt;/P&gt;&lt;P&gt;Event ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4624&lt;/P&gt;&lt;P&gt;Task Category: Logon&lt;/P&gt;&lt;P&gt;Level:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Information&lt;/P&gt;&lt;P&gt;Keywords:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Audit Success&lt;/P&gt;&lt;P&gt;User:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/AComputer:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ITDNS2.lab.org&lt;/P&gt;&lt;P&gt;Description:An account was successfully logged on.&lt;BR /&gt;Subject:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Security ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;SYSTEM&lt;/P&gt;&lt;P&gt;Account Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ITDNS2$&lt;/P&gt;&lt;P&gt;Account Domain: LAB&lt;/P&gt;&lt;P&gt;Logon ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0x3e7&lt;BR /&gt;Logon Type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;10&lt;BR /&gt;New Logon:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Security ID: LAB\administrator&lt;/P&gt;&lt;P&gt;Account Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;administrator&lt;/P&gt;&lt;P&gt;Account Domain:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;LAB&lt;/P&gt;&lt;P&gt;Logon ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0x2a9158bb&lt;/P&gt;&lt;P&gt;Logon GUID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;{00000000-0000-0000-0000-000000000000}&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Process Information:&lt;/P&gt;&lt;P&gt;Process ID:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0x584&lt;/P&gt;&lt;P&gt;Process Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;C:\Windows\System32\winlogon.exe&lt;BR /&gt;Network Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workstation Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ITDNS2&lt;/P&gt;&lt;P&gt;Source Network Address:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;172.16.16.200&lt;/P&gt;&lt;P&gt;Source Port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;60635&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Detailed Authentication Information:&lt;/P&gt;&lt;P&gt;Logon Process:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;User32 &lt;/P&gt;&lt;P&gt;Authentication Package:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Negotiate&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Transited&lt;/P&gt;&lt;P&gt;Services:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Package Name (NTLM only):&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Key Length:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This event is generated when a logon session is created. It is generated on the computer that was accessed.&lt;BR /&gt;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;BR /&gt;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&lt;BR /&gt;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&lt;BR /&gt;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;BR /&gt;The authentication information fields provide detailed information about this specific logon request.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Transited services indicate which intermediate services have participated in this logon request.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Package name indicates which sub-protocol was used among the NTLM protocols.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 22:04:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22419#M16345</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-02-01T22:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22420#M16346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;adding your RDP servers to the panagent ignore list may help eleviate this issue since it should then stop collecting logon info from your server and only check your user pc's&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 15:41:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22420#M16346</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2011-02-09T15:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22421#M16347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it's collecting the logon information from the client side, not the server side, in AD. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: Calibri, Verdana, Helvetica, Arial;"&gt;I imagine that it’s coming from the way Terminal Services Client 6.0 send the credentials first before letting you log into the server. I think 5 would bring up the console, and then allow you to login.&lt;/SPAN&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Feb 2011 18:56:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22421#M16347</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-02-09T18:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22422#M16348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I would like to elaborate on a similar issue that i am having.&lt;/P&gt;&lt;P&gt;i have 2 usernames, a local one say abc and another one with more privileges, say xyz.&lt;/P&gt;&lt;P&gt;i use xyz to rdp to servers etc. and am usually logged into my pc with abc. my problem is that i am using usernames in the palo alto firewall for creating policies, and both of these user-ids have specific groups that they are part of being allowed through the firewall for different reasons.&lt;/P&gt;&lt;P&gt;Hence adding a particular user to the ignore list on the pan-agent isnt a solution, and the fact that the palo alto firewall maps users to an ip address, and the otherway round could be a bad news for a company that my use kiosks or hotdesking ...&lt;/P&gt;&lt;P&gt;Please advice if there is a solution for such issues.&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;Bhav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 09:59:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22422#M16348</guid>
      <dc:creator>bhavin_bhatt</dc:creator>
      <dc:date>2011-07-01T09:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22423#M16349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clarification question:&lt;/P&gt;&lt;P&gt;Which system is being marked with the rdp user login? Server or workstation?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jul 2011 23:36:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22423#M16349</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2011-07-01T23:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22424#M16350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the workstation and its ip address are being associated with the local login as well as the ad login credentials used to rdp to other servers.&lt;/P&gt;&lt;P&gt;This confuses the palo alto while deciding which user to associate the ip address to...the correct policy does not match for the user in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jul 2011 07:00:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22424#M16350</guid>
      <dc:creator>bhavin_bhatt</dc:creator>
      <dc:date>2011-07-04T07:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22425#M16351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My solution was to exclude the subnet our servers were on. May not be viable for everyone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 13:41:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22425#M16351</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2011-07-05T13:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22426#M16352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bhavin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server account which you use to login during an RDP session is it part of domain administrator account? If yes then can you please try an account which is not part of domain adminstrator and see if the PC retains it original user id and IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 13:51:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22426#M16352</guid>
      <dc:creator>mrajdev</dc:creator>
      <dc:date>2011-07-05T13:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22427#M16353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi mrajdev,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the response, i am afraid the usernames are part of the domain and unfortunately, in our environment, non-domained usernames are not permitted, is there any other solutions ?&lt;/P&gt;&lt;P&gt;i was thinking of ignoring the admin ad users on pan-agent and use the sys admins ip addresses in the policies, not a very smart solution, but am still in search of a better solution to this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Bhav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jul 2011 14:09:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22427#M16353</guid>
      <dc:creator>bhavin_bhatt</dc:creator>
      <dc:date>2011-07-05T14:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22428#M16354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Bhav,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When this issue occurs, are you logging on via RDP to a Domain Controller? If so, can you attempt to logon via RDP to another Server/Workstation (Non-DC) &amp;amp; confirm whether the original User-ID mappings on both machines are retained?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jul 2011 03:41:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22428#M16354</guid>
      <dc:creator>bryan</dc:creator>
      <dc:date>2011-07-06T03:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22429#M16355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am RDP'ing to a server and not a domain controller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Bhav&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jul 2011 10:20:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22429#M16355</guid>
      <dc:creator>bhavin_bhatt</dc:creator>
      <dc:date>2011-07-06T10:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22430#M16356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;unfortunately we dont have any non-domained PCs connected in our domain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Bhavin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jul 2011 10:22:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22430#M16356</guid>
      <dc:creator>bhavin_bhatt</dc:creator>
      <dc:date>2011-07-06T10:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22431#M16357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also experiencing the exact same behaviour!&lt;/P&gt;&lt;P&gt;Is there a best practice guide on how to best overcome this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2012 02:19:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22431#M16357</guid>
      <dc:creator>bjackson</dc:creator>
      <dc:date>2012-08-01T02:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22432#M16358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My only solution is to either wait for the WMI Query or have the user lock and unlock their PC. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2012 14:37:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22432#M16358</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2012-08-01T14:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: RDP and the PAN-Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22433#M16359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to some docs the following eventid's are being monitored for by the pan agent:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Win2003 DCs:&lt;/P&gt;&lt;P&gt;672&lt;/P&gt;&lt;P&gt;673&lt;/P&gt;&lt;P&gt;674&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Win2008 DCs:&lt;/P&gt;&lt;P&gt;4768&lt;/P&gt;&lt;P&gt;4769&lt;/P&gt;&lt;P&gt;4770&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I find it interresting that your eventid 4624 would have something to do with this... has the pan agent been updated to cover even the 4624 events for some odd reason?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2012 10:32:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-and-the-pan-agent/m-p/22433#M16359</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-08-07T10:32:47Z</dc:date>
    </item>
  </channel>
</rss>

