<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows and User-Mappings in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210968#M61568</link>
    <description>&lt;P&gt;does the user ip mapping ever update to the correct user or have you never left it for that long to test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Apr 2018 14:35:05 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2018-04-19T14:35:05Z</dc:date>
    <item>
      <title>Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210947#M61561</link>
      <description>&lt;P&gt;I have a user group in Active Directory where we place users who should not reach the internet. This user group is then tied to a Palo Alto rule to Deny access.&lt;/P&gt;&lt;P&gt;I've noticed (Windows PC) this week, that if a user who is in the Deny group logs in to a PC, they will be denied (works fine), however, lets say they log out and a person who should have access logs in to the same PC....packets are still hitting the firewall with the previous username, thus they get denied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I dont believe this might be entirely tied to Palo Alto, I have a feeling it is something in Windows-land, but I just wanted to see if anyone else has ran into this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One way to get it to work again is to change the VLAN on the user, forcing them to grab a different IP.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 13:19:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210947#M61561</guid>
      <dc:creator>david.alicea</dc:creator>
      <dc:date>2018-04-19T13:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210968#M61568</link>
      <description>&lt;P&gt;does the user ip mapping ever update to the correct user or have you never left it for that long to test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 14:35:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210968#M61568</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-04-19T14:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210970#M61570</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61422"&gt;@david.alicea&lt;/a&gt;&amp;nbsp;do you may be also block access to the domain controller for this deny group?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 15:03:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/210970#M61570</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-04-19T15:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211368#M61663</link>
      <description>&lt;P&gt;Yes, and you'd be correct.&amp;nbsp; Indirectly it has nothing to do with the firewall, but rather or firewall being updated with the user ID change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whichever method you're using for user attribution&amp;nbsp;I would ensure the update and general user-id collection intervals&amp;nbsp;are appropriate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More than likely what's occurring&amp;nbsp;is the user that is logging into the PC that shouldn't be denied is logging into the PC via credentials&amp;nbsp;which already exist on the PC.&amp;nbsp; Since you're collecting logs from a domain controller you aren't seeing updates to the firewall because there was in-fact no domain controller authentication.&amp;nbsp; The user authenticated to the local PC.&amp;nbsp; (That's just my guess)&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 16:16:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211368#M61663</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-04-23T16:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211882#M61780</link>
      <description>&lt;P&gt;On our end right now we are only using AD Authentication and not the actual User Agent-ID (yet). So the firewall is set to poll a few DCs on an interval. What settings would need to be updated to force more communication from the DC to the firewall. Or is it really trying to force more communication from the PC to the DC? That is what is sounds like based on your observation. The PC is the one not communicating to the DC to let the DC know there was a login change.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:32:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211882#M61780</guid>
      <dc:creator>david.alicea</dc:creator>
      <dc:date>2018-04-26T14:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211883#M61781</link>
      <description>&lt;P&gt;Its pretty wide open between DCs and users. This firewall is only traversed on the way to the internet.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 14:33:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211883#M61781</guid>
      <dc:creator>david.alicea</dc:creator>
      <dc:date>2018-04-26T14:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211936#M61802</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61422"&gt;@david.alicea&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Do you have an on-site Exchange enviroment that you could use to pull the security events from that? That in my case has been one of the more reliable ways to get user-id information in an office enviroment, simply because most users will always have Outlook open. Find more info on the Exchange setup &lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/configure-user-mapping-using-the-windows-user-id-agent" target="_blank"&gt;HERE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That or you could setup GlobalProtect as an always-on format to ensure that the User-Id mapping is always up-to-date regardless of whether the user is internal or external.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 20:17:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211936#M61802</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-26T20:17:06Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211937#M61803</link>
      <description>&lt;P&gt;Yep, we do have an on-prem Exchange...for now. My plan was to eventually go through with the actual User Agent-ID setup.&lt;/P&gt;&lt;P&gt;However...is that really going to solve the scenario of a shared PC?&lt;/P&gt;&lt;P&gt;One user who is denied logs in to&amp;nbsp;the shared PC&amp;nbsp;and gets denied to the internet by the FW...but the second user who logs in (and should have access to the internet) will not be denied? As one of the above posts stated, the Windows username who should be allowed to the internet&amp;nbsp;is logging into the same PC it already had a profile in.&amp;nbsp;So that will not send domain info over to the Domain Controller.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 20:23:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211937#M61803</guid>
      <dc:creator>david.alicea</dc:creator>
      <dc:date>2018-04-26T20:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211939#M61804</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61422"&gt;@david.alicea&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;This depends on whether or not the user is going to open Outlook on that machine. If they open their email after they login that will trigger the update for the user-id table if you are monitoring the Exchange enviroment. This would fix it from being denied.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the user isn't going to be logging into Outlook then this really isn't going to help you at all and you would have to explore the GlobalProtect options.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 20:30:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211939#M61804</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-26T20:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211958#M61807</link>
      <description>&lt;P&gt;using a UserID agent based set up would be better for your issues,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when multiple people are logging in the same computer, the agent would pick up the latest login event of that pc and update it in firewall,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For no check with AD, i believe its partialy true, yes it will allow to log in but in background the pc would try to authenticate the pc with the credentials entered, and if they have any application logged in with there id, it may take a few minutes and they should be mapped correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Captive portal can alo solve this probelm, by authenticating an unknown user to ip by prompting to the user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;your&amp;nbsp;other question should be how would you block a&amp;nbsp; "restricted" user that just logged in and since previous id is&amp;nbsp; "allowed"&amp;nbsp; obtains the access to internet, In that case, set the id timeout on user id agent (assuming you set it up) to a mere few minutes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;~HTH&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 22:58:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/211958#M61807</guid>
      <dc:creator>Harshit</dc:creator>
      <dc:date>2018-04-26T22:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: Windows and User-Mappings</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/212011#M61816</link>
      <description>&lt;P&gt;It seems everything is leading over to the Agent-ID. I'll begin the setup next week. Thanks everyone.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Apr 2018 11:51:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/windows-and-user-mappings/m-p/212011#M61816</guid>
      <dc:creator>david.alicea</dc:creator>
      <dc:date>2018-04-27T11:51:22Z</dc:date>
    </item>
  </channel>
</rss>

