<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID: gained access with run as admin in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138324#M47934</link>
    <description />
    <pubDate>Thu, 19 Jan 2017 13:40:16 GMT</pubDate>
    <dc:creator>kdd</dc:creator>
    <dc:date>2017-01-19T13:40:16Z</dc:date>
    <item>
      <title>User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138021#M47882</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;several user have internet access and this depends on their user-id. some&amp;nbsp;of them have admin-accounts and can run the ie as admin.&amp;nbsp;the user logged into the AD&amp;nbsp;as non-privileged user and this is controlled by the WMI-Process of the USER-Agent. But this construct didn't recognize when the user&amp;nbsp;starts the IE with run as admin.&lt;/P&gt;&lt;P&gt;is there a chance to prevent this so that the&amp;nbsp;FW allow only the access for the non privileged users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Klaus&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 07:38:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138021#M47882</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2017-01-18T07:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138034#M47883</link>
      <description>&lt;P&gt;hi Klaus!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are these local admin accounts or domain/enterprise ?&lt;/P&gt;
&lt;P&gt;Are your UserID agents also reading AD audit logs (login success)? As a domain acount login event (run as admin) should create an audit log which should switch the user/IP mapping to the admin account (until WMI re-reads the logged in user and falls back to the non-privileged user)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for setups like this the WMI probe can be problematic as it can only check which user is logged on to a system, not what kind of elevated access they are using to run a single process&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 08:27:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138034#M47883</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-01-18T08:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138052#M47885</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;these are domain-accounts and our User-IDAgent&amp;nbsp; reads the audit-logs. Thx for your hint. I will check the log of the User-ID Agent to see what is logged. Therefor i need the help of this specific user. I keep you updated.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Klaus&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 10:30:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138052#M47885</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2017-01-18T10:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138081#M47892</link>
      <description>&lt;P&gt;i took a look at the User-Id Agent log right after the user tried it with IE (run as admin) and i didn't see an entry with the admin account. Maybe there is no entry at the AD-log and PA has no chance to get the admin&amp;nbsp;account. How is it possible to catch a user like this one?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 11:52:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138081#M47892</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2017-01-18T11:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138324#M47934</link>
      <description />
      <pubDate>Thu, 19 Jan 2017 13:40:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138324#M47934</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2017-01-19T13:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138332#M47938</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this can't be solved with PAN-OS because there no log-entry at the AD-log.&amp;nbsp;The way i have to go is to use the GPO for these Clients. That is the answer of our systemhouse.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Klaus&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 14:43:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138332#M47938</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2017-01-19T14:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138344#M47940</link>
      <description>&lt;P&gt;From configuration mode on your firewall, you could use the following command: &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set user-id-collector ignore-user [ &amp;lt;ignore-user1&amp;gt; &amp;lt;ignore-user2&amp;gt;... ]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will prevent the firewall from creating mappings for users in this list. &amp;nbsp;If you add "admin" or "administrator" to this list, then the users will continue to be mapped as non-privileged users from the firewall perspective and they won't get any additional access if they use "run-as". &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2017 15:23:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138344#M47940</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2017-01-19T15:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID: gained access with run as admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138515#M47973</link>
      <description>&lt;P&gt;the log-entry is showing always the non-privileged user even the user starts the IE with run as. So how should this work?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2017 09:12:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-gained-access-with-run-as-admin/m-p/138515#M47973</guid>
      <dc:creator>kdd</dc:creator>
      <dc:date>2017-01-20T09:12:20Z</dc:date>
    </item>
  </channel>
</rss>

