<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User identifcation gaps in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46375#M34097</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bit of a 'how long is a piece of string question' I'm afraid, so many factors!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However - hopefully a bit more useful - one issue I found that could result in mapped users being 'lost' was enabling the 'Server Session' tracking in the agent.&amp;nbsp; Not sure why specifically, but if this check returns a user mapping that does *not* tally with the currently mapped users the agent 'resets' the node so it doesn't have either account associated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The next time some device activity raises an AD event entry the user account is rermapped, but this does cause periods where no user is known for the device, which sounds like it could be what you're seeing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try playing with the timeouts, settings etc; or enable transparent NTLM auth for that source IP so it will perform an interactive authentication as that way it will force a background authentication when the kiosk machine connects to the web and should block it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 May 2012 17:17:41 GMT</pubDate>
    <dc:creator>apackard</dc:creator>
    <dc:date>2012-05-22T17:17:41Z</dc:date>
    <item>
      <title>User identifcation gaps</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46374#M34096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have an AD account for which we restrict all Internet access via a user-based security rule. The account is an auto-logon account for certain kiosk-type machines in our environment. I'm finding that the username being used on the machine is not always recognized by PA, and as a result Internet traffic is being allowed. There are other times when it recognizes that account and properly blocks Internet access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know why there are times that the username is not known to PA, and is there anything I can do to fix that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2012 15:24:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46374#M34096</guid>
      <dc:creator>kmurphy6</dc:creator>
      <dc:date>2012-05-22T15:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: User identifcation gaps</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46375#M34097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bit of a 'how long is a piece of string question' I'm afraid, so many factors!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However - hopefully a bit more useful - one issue I found that could result in mapped users being 'lost' was enabling the 'Server Session' tracking in the agent.&amp;nbsp; Not sure why specifically, but if this check returns a user mapping that does *not* tally with the currently mapped users the agent 'resets' the node so it doesn't have either account associated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The next time some device activity raises an AD event entry the user account is rermapped, but this does cause periods where no user is known for the device, which sounds like it could be what you're seeing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try playing with the timeouts, settings etc; or enable transparent NTLM auth for that source IP so it will perform an interactive authentication as that way it will force a background authentication when the kiosk machine connects to the web and should block it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2012 17:17:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46375#M34097</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2012-05-22T17:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: User identifcation gaps</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46376#M34098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much! I'll look into those suggestions....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2012 17:37:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46376#M34098</guid>
      <dc:creator>kmurphy6</dc:creator>
      <dc:date>2012-05-22T17:37:15Z</dc:date>
    </item>
    <item>
      <title>Re: User identifcation gaps</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46377#M34099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also enabling WMI and disable NETBIOS seems to be recommended (given that your clients provides a WMI interface for the server running your userid agent).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2012 06:28:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-identifcation-gaps/m-p/46377#M34099</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-05-23T06:28:14Z</dc:date>
    </item>
  </channel>
</rss>

