<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID Agent Windows Firewall Settings in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6374#M4639</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The windows firewall rules created using the by program method are usually successful for this type of operation.&amp;nbsp; But as you have seen if there are some communications involved that are well-known standards ports then they may still be seen as separate from your program allowed setting in windows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other thing to be aware of is that these program rules are not necessarily permanent in their operational port selection.&amp;nbsp; They are mostly the same but they are deployed based on how windows programmatically sees the application working.&amp;nbsp; I generally use them to identify the unknown ports of communication on a server then write specific inbound and outbound port based rules for all the traffic so identified and remove the program rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course the best solution is that vendors provide a kb article on their application traffic and direction needs so we can create those rules in the first place when the application is installed and activated.&amp;nbsp; So we don't have to find them in packet captures and reverse engineer the rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Jan 2015 13:37:31 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-01-01T13:37:31Z</dc:date>
    <item>
      <title>User-ID Agent Windows Firewall Settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6372#M4637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just found a bit of a weird problem with the User-ID on a 2008 server due to the windows firewall.&lt;/P&gt;&lt;P&gt;I am using AD service polling and SYSLOG feeds for the User-ID but I couldn't get the syslog messages to be recognised.&amp;nbsp; I could see them hitting the server via wireshark and when I turned of f the Windows Firewall they started working so it was clear where the problem was.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I configured the Windows Firewall I selected the user ID service and allowed all ports and protocols to it (inbound rule).&amp;nbsp; This meant that the firewalls could connect to it and I confirmed that was working OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way I could get the syslog messages through was to create another rule allowing UDP 514 through to any program/service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking up with netstat though, port UDP514 was owned by the UAService.exe process which was the same as port TCP 5007 so that seemed as if it ought to work with the initial rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone shed any light on why that first rule didn't work and what the recommended windows firewall rules are? (I did a search and couldn't see any articles on this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2014 19:15:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6372#M4637</guid>
      <dc:creator>djr</dc:creator>
      <dc:date>2014-12-03T19:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Agent Windows Firewall Settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6373#M4638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;UDP 514 is for the Syslog messages&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2946"&gt;Does Syslog Use Random or Fixed Port?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP 5007 is for the communication from the Firewall to the User-ID Agent&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2831"&gt;What is the Communication Direction for User-ID?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not clear what "first rule" you're referring to.&lt;/P&gt;&lt;P&gt;The recommended Windows Firewall configuration is to only open the ports you need to make the set of features you need, work for your setup. Make sure to understand the ports you need. It wouldn't be wise to open more ports than you needed and these vary from setup to setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Dec 2014 23:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6373#M4638</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2014-12-30T23:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Agent Windows Firewall Settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6374#M4639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The windows firewall rules created using the by program method are usually successful for this type of operation.&amp;nbsp; But as you have seen if there are some communications involved that are well-known standards ports then they may still be seen as separate from your program allowed setting in windows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other thing to be aware of is that these program rules are not necessarily permanent in their operational port selection.&amp;nbsp; They are mostly the same but they are deployed based on how windows programmatically sees the application working.&amp;nbsp; I generally use them to identify the unknown ports of communication on a server then write specific inbound and outbound port based rules for all the traffic so identified and remove the program rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course the best solution is that vendors provide a kb article on their application traffic and direction needs so we can create those rules in the first place when the application is installed and activated.&amp;nbsp; So we don't have to find them in packet captures and reverse engineer the rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jan 2015 13:37:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6374#M4639</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-01-01T13:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Agent Windows Firewall Settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6375#M4640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "first rule" was the rule based on the service process rather than the port based rules for SYSLOG and the User ID agent port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your last line is precisely why I went for the service-based option.&amp;nbsp; I prefer to think of processes as trusted, so allowing the service is better in my mind than allowing all the ports it may need (and having to reverse engineer which ports it needs as Steven said).&amp;nbsp; It also means if I add another User ID mechanism I don't have to go round my agents fiddling with firewall rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do think a KB article or preferably something in the documentation on the windows firewall config would be reasonable, if the software installation doesn't do that for you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Jan 2015 09:59:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6375#M4640</guid>
      <dc:creator>djr</dc:creator>
      <dc:date>2015-01-05T09:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Agent Windows Firewall Settings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6376#M4641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right now the closest thing we have to the firewall recommendation is the document 2831 linked by mivaldi above.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2831"&gt;What is the Communication Direction for User-ID?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added a comment there asking for it to be expanded with more specific information on windows server firewall recommendations.&amp;nbsp; The documentation and kb teams are pretty good about responding to reasonable requests like this.&amp;nbsp; so hopefully, you will see it updated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jan 2015 02:35:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-windows-firewall-settings/m-p/6376#M4641</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-01-06T02:35:50Z</dc:date>
    </item>
  </channel>
</rss>

