<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How real-time is User-ID? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/414#M318</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kind of as per the subject really.&amp;nbsp; I'm interested in using User ID so that only authenticated users have internet access, but I'm not sure quite how "real-time" it is?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Someone comes in and switches on a computer, logs onto the domain, tries to browse the web - will the Palo Alto know so soon that they are now the user logged onto a particular PC?&lt;/LI&gt;&lt;LI&gt;What happens if multiple users logon to the same PC?&lt;/LI&gt;&lt;LI&gt;What happens if someone brings in their laptop and they're already logged on, lets's say the laptop's in Standby, but they just wake it up and plug back in to the LAN?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I'm trying to understand the downsides of using User-ID for policy enforcement rather than simply for additional log information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our PAN is running 4.1.8 and our User Agent is 3.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Dec 2012 15:28:10 GMT</pubDate>
    <dc:creator>networkadmin</dc:creator>
    <dc:date>2012-12-06T15:28:10Z</dc:date>
    <item>
      <title>How real-time is User-ID?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/414#M318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kind of as per the subject really.&amp;nbsp; I'm interested in using User ID so that only authenticated users have internet access, but I'm not sure quite how "real-time" it is?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Someone comes in and switches on a computer, logs onto the domain, tries to browse the web - will the Palo Alto know so soon that they are now the user logged onto a particular PC?&lt;/LI&gt;&lt;LI&gt;What happens if multiple users logon to the same PC?&lt;/LI&gt;&lt;LI&gt;What happens if someone brings in their laptop and they're already logged on, lets's say the laptop's in Standby, but they just wake it up and plug back in to the LAN?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically I'm trying to understand the downsides of using User-ID for policy enforcement rather than simply for additional log information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our PAN is running 4.1.8 and our User Agent is 3.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 15:28:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/414#M318</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2012-12-06T15:28:10Z</dc:date>
    </item>
    <item>
      <title>Re: How real-time is User-ID?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/415#M319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's pretty much real time. There are some time gaps, but it should not be noticeable by a user. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A user logging into the domain adds an event to the DC. As long as User-ID is reading those security logs, the first time the user goes through the firewall it will check with User-ID. That will have already read the log and have the user's IP mapping cached, so the very first request will already have the user name to IP mapping.&lt;/LI&gt;&lt;LI&gt;If two or more users are logged into the same computer (like a terminal server), the most recent user will overwrite the mapping for the previous user. For that reason, you should run the Terminal Server Agent on all systems that have multiple users logging in to them. The Terminal Server Agent will dole out source port ranges to each user that logs in, and that mapping will let the firewall know who is generating that request.&lt;/LI&gt;&lt;LI&gt;Bringing a computer off standby *should* generate a domain controller security event as well. If there is no event, User-ID (at least the 4.1 version, I'm not sure about the 3.1 version) has a couple options: a WMI probe, or a NetBIOS query. If you have those enabled in User-ID, it will try WMI first and NetBIOS as a last-ditch effort. If those are not enabled or fail, the user will be unknown. You can also enable a Captive Portal for devices that do not join the domain.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Greg &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 21:04:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/415#M319</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2012-12-06T21:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: How real-time is User-ID?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/416#M320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Greg, Captive Portal as a "last resort" rule if the user is still unknown sounds very workable here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We're on 4.1.8 and I must admit I'm a little confused from the online help how I'd only display the portal if the User-ID was unknown, and how I'd hook the portal into LDAP/Active Directory for authentication - do you have any link or KB articles please (I'm just going to do a search of Knowledge Point now ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Dec 2012 13:49:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/416#M320</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2012-12-08T13:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: How real-time is User-ID?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/417#M321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure a captive portal policy first, for eg: trust to un-trust, action: captive-portal. If the firewall receives a http request from a IP it doesn't have any user-mapping for, they are basically 'Unknown' and will trigger the portal authentication page. You can configure the authentication profile/mode of Captive portal to use as well, from Device tab---&amp;gt;User-identification--&amp;gt;Captive portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a good reference guide,&lt;/P&gt;&lt;P&gt;&lt;A __default_attr="1159" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Aditi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Dec 2012 02:41:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/417#M321</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2012-12-09T02:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: How real-time is User-ID?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/418#M322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Aditi, I've got it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the next question - right now I have a "whitelist" rule as the last rule in my security policy.&amp;nbsp; It essentially says&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"If it's from the Lan to Any other Zone, if it's in the "whitelist" URL Filtering profile allow it, otherwise block it".&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is used for a few domains such as antivirus updates, microsoft, etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's the best way to drop a rule in underneath this as the captive portal rule so that the whitelist rule still fires, since it's used by things such as servers that don't have a person sitting there to enter credentials - is source IP in the captive portal the only option here?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Dec 2012 11:36:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-real-time-is-user-id/m-p/418#M322</guid>
      <dc:creator>networkadmin</dc:creator>
      <dc:date>2012-12-10T11:36:45Z</dc:date>
    </item>
  </channel>
</rss>

