<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Use of computer ldap groups in source-user policy field on palo alto in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196657#M58544</link>
    <description>&lt;P&gt;perhaps I wasn't explicit enough - we need the policy applied to Workstation PC's that are part of a particular domain group.&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jan 2018 15:57:08 GMT</pubDate>
    <dc:creator>dhirvin</dc:creator>
    <dc:date>2018-01-24T15:57:08Z</dc:date>
    <item>
      <title>Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196388#M58496</link>
      <description>&lt;P&gt;We are attempting to use a computer based ldap group in the source-user field of a traffic policy on our palo alto 5020.&lt;/P&gt;&lt;P&gt;At the moment that policy is being ignored, and subsequent policies based just on the same source ip group are being acted on.&lt;/P&gt;&lt;P&gt;(if the source-user is set to any (removing group domain\wkstn_group) then the policy works)&lt;/P&gt;&lt;P&gt;We have been successfully using source-user fields based on used-id and user group membership.&lt;/P&gt;&lt;P&gt;Could you confirm whether or not it is possible to use computer group membership in the source user field&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 11:29:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196388#M58496</guid>
      <dc:creator>dhirvin</dc:creator>
      <dc:date>2018-01-23T11:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196402#M58498</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/81713"&gt;@dhirvin&lt;/a&gt;, hi.&lt;/P&gt;&lt;P&gt;i can't confirm your suspicians but perhaps somebody else can.&lt;/P&gt;&lt;P&gt;At a guess I would say "No" as the user ip mapping process relates to the user, not the device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for globalprotect usage this can be resolved by HIP but thats probably no help to you.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 12:24:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196402#M58498</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-01-23T12:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196411#M58501</link>
      <description>&lt;P&gt;Palo doesn't have a way currently to use computer based security groups for a "source host" policy enforcement.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 14:30:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196411#M58501</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-23T14:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196632#M58534</link>
      <description>&lt;P&gt;That said if you're good with scripting and scanning AD you can do what we've done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a script which&amp;nbsp;dumps an AD security group&lt;/LI&gt;&lt;LI&gt;take these hostnames in NSLOOKUP and get their IP --&amp;gt; dump this to another file&lt;/LI&gt;&lt;LI&gt;Take this NSLOOKUP file and create a EDL (palo) object pointing to this NSLOOKUP file&lt;/LI&gt;&lt;LI&gt;Use the EDL file with the IPs of the hostnames which exist in the security group&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Viola You've got a security policy which is based on security group membership!!&amp;nbsp; (We do this for a few sensitive use cases at my company)&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 14:46:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196632#M58534</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-24T14:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196649#M58540</link>
      <description>&lt;P&gt;wow... clever stuff &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;are you able to update this dynamically.. or do you just assume the devices will always get the same ip address.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mick.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:33:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196649#M58540</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-01-24T15:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196656#M58543</link>
      <description>&lt;P&gt;We do assume the computers have different IPs.&amp;nbsp; Our script runs on a specified interval and updates the "known IP" for the machine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So when DNS gets updated our script runs, updates the IP address in the text file.&amp;nbsp; The EDL update on the firewall happens on a specified interval and it too gets an updated record of the "computer object."&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:55:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196656#M58543</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-24T15:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196657#M58544</link>
      <description>&lt;P&gt;perhaps I wasn't explicit enough - we need the policy applied to Workstation PC's that are part of a particular domain group.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:57:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196657#M58544</guid>
      <dc:creator>dhirvin</dc:creator>
      <dc:date>2018-01-24T15:57:08Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196678#M58547</link>
      <description>&lt;P&gt;yep, gotcha...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the PA has no real concept of a user, its just a tag related to an IP address.&lt;/P&gt;&lt;P&gt;it gets this tag from the AD security policy on DC's or similar..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so...&lt;/P&gt;&lt;P&gt;ip 10.10.10.10 is normally tagged to user fred via AD security log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;suggestion the tag is no longer obtained from the security log relating to the user.&lt;/P&gt;&lt;P&gt;it will get the tag from the new file created with hostnames...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip 10.10.10.0 is now tagged to freds_pc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so the PA policy will now see freds_pc, not fred. &amp;nbsp;as long as freds_pc is allowed in the policy, either directly or by group membership then it will be allowed, or of course denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;perhaps &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;can explain better as i have never used this as an option but can see how it works. (i hope)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 16:47:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196678#M58547</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-01-24T16:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196699#M58552</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/81713"&gt;@dhirvin&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;perhaps I wasn't explicit enough - we need the policy applied to Workstation PC's that are part of a particular domain group.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Maybe I confused you.&amp;nbsp; What I described is exactly that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Machine (call it PC A) which are a part of a computer group / container (call it "security team")&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Create a script which queries "security team" computer container --&amp;gt; Creates a text file and dumps "PC A" into said file&lt;/LI&gt;&lt;LI&gt;Script reads text file does NSLOOKUP for PC A --&amp;gt; Creates a new text file with the IP address for PC A in this new file&lt;/LI&gt;&lt;LI&gt;Create EDL (palo object) which points to this second text file which has an IP address for a machine name&lt;/LI&gt;&lt;LI&gt;Use EDL in security policy as source / dest IP&amp;nbsp;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:21:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196699#M58552</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-24T18:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196701#M58553</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;yep, gotcha...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the PA has no real concept of a user, its just a tag related to an IP address.&lt;/P&gt;&lt;P&gt;it gets this tag from the AD security policy on DC's or similar..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so...&lt;/P&gt;&lt;P&gt;ip 10.10.10.10 is normally tagged to user fred via AD security log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;suggestion the tag is no longer obtained from the security log relating to the user.&lt;/P&gt;&lt;P&gt;it will get the tag from the new file created with hostnames...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip 10.10.10.0 is now tagged to freds_pc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so the PA policy will now see freds_pc, not fred. &amp;nbsp;as long as freds_pc is allowed in the policy, either directly or by group membership then it will be allowed, or of course denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;perhaps &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;can explain better as i have never used this as an option but can see how it works. (i hope)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully my further explination clears things up.&amp;nbsp; We do use user-ID enforcement for policy, however that's used in different areas.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The process I'm describing for getting machine IPs in my scenario isn't tied to a particular user.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We querry the machine object in the script so regardless who may or may not be logged into the machine gets policy based upon the current IP of the machine name. (Just as you have pointed out)&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:32:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196701#M58553</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-24T18:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: Use of computer ldap groups in source-user policy field on palo alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196707#M58556</link>
      <description>&lt;P&gt;Here are two screenshots.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the EDLs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EDL_1.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13395iC1F6B599027CFCD1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="EDL_1.PNG" alt="EDL_1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Review of current security logs which take the intended security policy (Of note you can see one of the entries has an obfuscated user so you can see both "known" and "unkown" user match our intended security policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="EDL_2.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13396iE0D378D1CAD5D1BC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="EDL_2.PNG" alt="EDL_2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:45:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/use-of-computer-ldap-groups-in-source-user-policy-field-on-palo/m-p/196707#M58556</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-24T18:45:30Z</dc:date>
    </item>
  </channel>
</rss>

