<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Testing 8.0 Credential phishing prevention in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211382#M63344</link>
    <description>&lt;P&gt;I see. I wasnt aware of that restriction.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 23 Apr 2018 18:21:51 GMT</pubDate>
    <dc:creator>dkordyban</dc:creator>
    <dc:date>2018-04-23T18:21:51Z</dc:date>
    <item>
      <title>Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/194874#M63332</link>
      <description>&lt;P&gt;Support says eveything has been setup properly for this to work. How would you test that users would not be able to enter domain credentials into bogus site?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 21:39:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/194874#M63332</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-01-11T21:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/194881#M63333</link>
      <description>&lt;P&gt;I suggest you create a bogus user with a bogus password and test it.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 22:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/194881#M63333</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2018-01-11T22:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/194928#M63334</link>
      <description>&lt;P&gt;That has been done.&lt;/P&gt;&lt;P&gt;The problem I run into is finding a url to test against. Unless someting is not setup correctly.&lt;/P&gt;&lt;P&gt;Real Example:&lt;/P&gt;&lt;P&gt;User get phish message asking them to fix thier O365 account due to unusual activity.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.tasteofthewild.com.au" target="_blank"&gt;https://www.tasteofthewild.com.au&lt;/A&gt;. PA url filter categorizes as person blogs.&lt;/P&gt;&lt;P&gt;User goes to site and is allowed to put in domain creds.&lt;/P&gt;&lt;P&gt;Looking at URL monitor traffic is decrypted and no cred detected. Site has been SSL decrypted and the personal blogs category is set to block user credentail submission.&lt;/P&gt;&lt;P&gt;Maybe it has something to do with the bloom filters not getting propgated to firewall. Not sure how to tell. I was just hoping to get input from someone else already using this.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 11:26:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/194928#M63334</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-01-12T11:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/195050#M63335</link>
      <description>&lt;P&gt;also this is somewhat confusing (from 8.0 Admin guide):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;" The firewall automatically skips checking credential submissions for App-IDs associated with sites that have never been observed hosting malware or phishing content to ensure the best performance even if you enable checks in the corresponding category. The list of sites on which the firewall will skip credential checking is automatically updated via Application and Threat content updates."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this mean websites with a good reputation will be skippped from credential submit check , even if I have the category set to block cred submission?&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2018 14:17:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/195050#M63335</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-01-13T14:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/199331#M63336</link>
      <description>&lt;P&gt;Dkordyban,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This must be why it did not work for me. Phishing website was in the education category but it was obivously phishing. I tested it with a phony account and never triggered the Cred check.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;RG&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 14:01:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/199331#M63336</guid>
      <dc:creator>RyanGates</dc:creator>
      <dc:date>2018-02-07T14:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211253#M63337</link>
      <description>&lt;P&gt;I know this thread is a little old, but what groups do you have in your Allowed RODC&amp;nbsp;password replication policy?&amp;nbsp; I think we may be running into the same issue.&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32225"&gt;@dkordyban&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Apr 2018 14:35:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211253#M63337</guid>
      <dc:creator>staustin</dc:creator>
      <dc:date>2018-04-22T14:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211338#M63338</link>
      <description>&lt;P&gt;I have domain users in the group. It appears to work for me now. Not sure what changed. Maybe it just needed some more time.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 13:06:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211338#M63338</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-04-23T13:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211352#M63339</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How did you test to see if it worked?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;RG&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 13:56:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211352#M63339</guid>
      <dc:creator>RyanGates</dc:creator>
      <dc:date>2018-04-23T13:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211353#M63340</link>
      <description>&lt;P&gt;Went to netflix.com and and tried domain creds.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 14:11:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211353#M63340</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-04-23T14:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211356#M63341</link>
      <description>&lt;P&gt;I thought it would skip that website. Going to give that a try right now. Also, are you running an SSL decryption profile?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;" The firewall automatically skips checking credential submissions for App-IDs associated with sites that have never been observed hosting malware or phishing content to ensure the best performance even if you enable checks in the corresponding category. The list of sites on which the firewall will skip credential checking is automatically updated via Application and Threat content updates."&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 14:27:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211356#M63341</guid>
      <dc:creator>RyanGates</dc:creator>
      <dc:date>2018-04-23T14:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211358#M63342</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32225"&gt;@dkordyban&lt;/a&gt;The reason I ask is that I hooked up a debugging mechanism to the pan user id credential agent connection between the credential agent and&amp;nbsp;its RODC ldap connection that exists locally on the machine, because credential phishing detection (based on username/password) combo was not working.&amp;nbsp; If i just switch it to username that would work, but that net is too large.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the query that the credential agent runs against LDAP to enumerate users in the "Domain Users" group, assuming that's the one of the groups present in "Allowed RODC Password Replication Group".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(&amp;amp;(&amp;amp;(objectclass=Person)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))(memberof=cn=domain users,cn=users,dc=saustin,dc=com))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This query would absolutely work for any group EXCEPT the primary group.&amp;nbsp; The reason is that enumerating users in the primary group can't be done like this in AD and this query returns 0 user names and thus no credentials would be read via the credential agent for that group.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I verified this in my lab setup and production.&amp;nbsp; I then added a random second (non-primary) group to&amp;nbsp;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;Allowed RODC Password Replication Group"&lt;/SPAN&gt; that exist in my AD forest and bounced the credential agent.&amp;nbsp; The credential agent was able to enumerate those users and create a bloom filter for them just fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can check the number of credentials sent from the credential agent to the firewall by running this command&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image (5).png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14826iBD091D8DD9EF5328/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image (5).png" alt="image (5).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have well over 2000+ users in my AD forest, and currently 500~ passwords cached on the RODC (verified via active directory tools) which is quite a bit larger than 67.&amp;nbsp; 67 is conviently the exact number of users that exist in the non-primary group I added to verify my hunch about the credential agent not properly enumerating users in the "Domain Users" group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're seeing that&amp;nbsp;the credential count for the bloom filter on the firewall corresponds to all the users in your AD, i'd be curious to know what version of the credential agent and user-id agent you're using.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 14:37:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211358#M63342</guid>
      <dc:creator>staustin</dc:creator>
      <dc:date>2018-04-23T14:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211366#M63343</link>
      <description>&lt;P&gt;netflix seems to always be a good test for us. Yes, we decrypt most traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 16:11:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211366#M63343</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-04-23T16:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211382#M63344</link>
      <description>&lt;P&gt;I see. I wasnt aware of that restriction.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 18:21:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211382#M63344</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-04-23T18:21:51Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211384#M63345</link>
      <description>&lt;P&gt;Wondering if I could just nest the domain users into another global group then make it a member of Allowed RODC users?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 18:27:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211384#M63345</guid>
      <dc:creator>dkordyban</dc:creator>
      <dc:date>2018-04-23T18:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211392#M63346</link>
      <description>&lt;P&gt;That unfortunately wouldn't work as the credential agent just recursively goes through all groups in the allowed rodc password replication group, then runs a direct ldap query trying to enumerate that group.&amp;nbsp; The only way to enumerate users in "Domain Users" doing a ldap query is to use&amp;nbsp;&lt;SPAN&gt;(primaryGroupID=&lt;/SPAN&gt;&lt;EM&gt;513&lt;/EM&gt;&lt;SPAN&gt;).&amp;nbsp; I'm trying to raise the issue with my account rep.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Apr 2018 19:14:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/211392#M63346</guid>
      <dc:creator>staustin</dc:creator>
      <dc:date>2018-04-23T19:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/215413#M63347</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue has been raised a little while back.&amp;nbsp; Support for the "Domain Users" group may be ported into 8.0.10 but has not been yet.&lt;/P&gt;</description>
      <pubDate>Thu, 24 May 2018 22:01:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/215413#M63347</guid>
      <dc:creator>ArthurEmr</dc:creator>
      <dc:date>2018-05-24T22:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219304#M63348</link>
      <description>&lt;P&gt;Has anyone made any progress getting this working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently in the process of trying to get this deployed in my environment&amp;nbsp;(have an active support case) but am running into a fair amount of obstacles.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have multiple RODCs in our environment&amp;nbsp;so we created a new RODC just for this purpose.&amp;nbsp; We removed the inherent "Allowed RODC Password Replication" group vice adding to this group as we didn't want to cache accounts globally across the enterprise.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like we're initially being told from TAC that the credential software will only query this inherent group .&amp;nbsp; (which we've removed - FR likely to query something other than "Allowed&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;RODC&lt;SPAN&gt;&amp;nbsp;Password Replication"&lt;/SPAN&gt; )&amp;nbsp; Instead we added "Domain Users" to be allowed to be cached locally on this RODC in question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We probably have 25,000+ user/service accounts and so far we only have 570 cached account on the RODC post allowing "Domain Users" to be cached.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*EDIT* UIA/Cred software is creating a Bloomfilter that currently only contains 20 user accounts&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My AD guys are telling me that the caching process only occurs when the RODC proxies an auth request for a specific&amp;nbsp;account.&amp;nbsp; Apparently you can force the RODC to cache an account, but it's on an individual account basis and can't be done via user/security groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*EDIT* Using RODC 2016 - UIA/Cred software 8.0.9-6 (also tried 8.0.8-2)&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2018 17:24:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219304#M63348</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-06-26T17:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219307#M63349</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There could be a few reasons it's not working.&amp;nbsp; I want to confirm I understand you correctly first.&amp;nbsp; Are you saying that you removed the "allowed rodc password replication group" from the password replication policy tab of the RODC?&amp;nbsp; And then you replaced it with "Domain Users" and set it to allow in the password replication policy tab of the RODC?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first reason this doesn't work is because the PAN credential agent cannot enumerate users in "Domain Users".&amp;nbsp; The reason it can't do it is because "Domain Users" is a special AD object and the credential agent does't form the ldap query properly.&amp;nbsp;&amp;nbsp;In addition to the aforementioned issue, I don't know if the credential agent will query any group that's not in "&lt;SPAN&gt;allowed rodc password replication group" (this is a conjecture as i've only nested groups in "allowed rodc password replication group".&amp;nbsp; The second part may not be a contributing factor.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What I had to do to get it working is as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1.&amp;nbsp; I created an AD object called allmyusers and added all user accounts to the group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2.&amp;nbsp; I added allmyusers object to "Allowed rodc password replciation group"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3.&amp;nbsp; Bounced the pan userid and credential agent&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Until PAN fixes the issue, "Domain users" will not work and you have to create a different group that essentially does the same thing but isn't the build in "Domain users" group.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2018 17:32:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219307#M63349</guid>
      <dc:creator>staustin</dc:creator>
      <dc:date>2018-06-26T17:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219310#M63350</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41416"&gt;@staustin&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There could be a few reasons it's not working.&amp;nbsp; I want to confirm I understand you correctly first.&amp;nbsp; Are you saying that you removed the "allowed rodc password replication group" from the password replication policy tab of the RODC?&amp;nbsp; And then you replaced it with "Domain Users" and set it to allow in the password replication policy tab of the RODC?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41416"&gt;@staustin&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;In addition to the aforementioned issue, I don't know if the credential agent will query any group that's not in "&lt;SPAN&gt;allowed rodc password replication group" (this is a conjecture as i've only nested groups in "allowed rodc password replication group".&amp;nbsp; The second part may not be a contributing factor.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what we did, and we're being told the user-agent / cred software is likely only coded to query&amp;nbsp;this inherent group.&amp;nbsp; We don't want to use this inherent group utilized across our enterprise on other RODCs (scope creep / security risk...why push cached creds to RODCs on RODCs that don't need it)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/41416"&gt;@staustin&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What I had to do to get it working is as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1.&amp;nbsp; I created an AD object called allmyusers and added all user accounts to the group.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2.&amp;nbsp; I added allmyusers object to "Allowed rodc password replciation group"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3.&amp;nbsp; Bounced the pan userid and credential agent&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Until PAN fixes the issue, "Domain users" will not work and you have to create a different group that essentially does the same thing but isn't the build in "Domain users" group.&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's the inherent problem with our deployment.&amp;nbsp; Why would we replicate our entire enterprise password cache to "sensitive" locations in our environment&amp;nbsp;by putting all users in an inherent / global group?&amp;nbsp; This doesn't seem very secure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've actually got this working previously using software on a writeable domain controller.&amp;nbsp; it seems like it would be smarter to just utilize a writeable DC and not touch what should be this protected group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2018 17:41:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219310#M63350</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-06-26T17:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: Testing 8.0 Credential phishing prevention</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219311#M63351</link>
      <description>&lt;P&gt;Your concerns about security are definitely valid.&amp;nbsp; I was able to work with the constraint in my environment because we only have 2k users and all our DCs live in the same place.&amp;nbsp; PAN heavily recommends not using a writeable DC, but there's nothing stopping you.&amp;nbsp; You can still try not using the global allowed rodc password rep group and create a custom group with like 20-40 users in it first to see if the cred agent will try and query it.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2018 17:46:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/testing-8-0-credential-phishing-prevention/m-p/219311#M63351</guid>
      <dc:creator>staustin</dc:creator>
      <dc:date>2018-06-26T17:46:08Z</dc:date>
    </item>
  </channel>
</rss>

