<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can I enforce security based in AD Computer groups yet? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146416#M49187</link>
    <description>&lt;P&gt;At my company we make use of EDLs to accomplish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We built a script which scrubs the AD groups we want. &amp;nbsp;We then bump that script againts DNS. &amp;nbsp;That DNS output is dumped into a text file on our internal network which is hosted behind IIS. &amp;nbsp;We then target the Palo to that .txt file and leverage that object in the firewall for security policy controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This process is cumbersome for sure, but works for us.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Mar 2017 15:37:13 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2017-03-07T15:37:13Z</dc:date>
    <item>
      <title>Can I enforce security based in AD Computer groups yet?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146301#M49171</link>
      <description>&lt;P&gt;I see history here indicating the user-id agent has been blind to computer names when the group membership is added to user IDs. &amp;nbsp;The CLI DOES show the computer name as a userID (with a post-pended $) and the groups are mapped correctly to the computer group I created and dumped the computer in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the other hand the USER signed into that computer does not show the computer group as one of their member groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks like the base data is in the firewall but I can't get traffic or security policies to recognize the traffic from the computer name, only the AD user name.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there some way I can introduce computer names and/or computer groups into user-id based enforcement? My goal is to create a few policies based on AD computer group. Maybe custom AD groups in the Group Mappings Settings?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 01:54:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146301#M49171</guid>
      <dc:creator>JWileyR</dc:creator>
      <dc:date>2017-03-07T01:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: Can I enforce security based in AD Computer groups yet?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146416#M49187</link>
      <description>&lt;P&gt;At my company we make use of EDLs to accomplish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We built a script which scrubs the AD groups we want. &amp;nbsp;We then bump that script againts DNS. &amp;nbsp;That DNS output is dumped into a text file on our internal network which is hosted behind IIS. &amp;nbsp;We then target the Palo to that .txt file and leverage that object in the firewall for security policy controls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This process is cumbersome for sure, but works for us.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 15:37:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146416#M49187</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-03-07T15:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can I enforce security based in AD Computer groups yet?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146578#M49228</link>
      <description>&lt;P&gt;Brandon, thanks for the reply. I'm guessing that the pain you go through to harvest this data is a result of not having a palo-alto supported solution to this? Does anyone else have alternatives? Something in PANOS 8 maybe?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2017 02:08:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146578#M49228</guid>
      <dc:creator>JWileyR</dc:creator>
      <dc:date>2017-03-08T02:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Can I enforce security based in AD Computer groups yet?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146656#M49243</link>
      <description>&lt;P&gt;Correct as of 7.1 and lower. &amp;nbsp;There's no way I know of to enumerate computer groups and apply them to a "source" or "dest" for security policy.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Mar 2017 14:46:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/can-i-enforce-security-based-in-ad-computer-groups-yet/m-p/146656#M49243</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2017-03-08T14:46:22Z</dc:date>
    </item>
  </channel>
</rss>

