<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Agentless vs Agent based User-ID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222537#M63991</link>
    <description>&lt;P&gt;In an agent based user-id deployment the UIA queries&amp;nbsp;the defined DC and collects all the logs which are new since the last update interval and discards&amp;nbsp; all but the required event IDs for user-ID mappings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In an agentless deployment the firewall only collects the necessary event IDs for user-ID mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also thought there was some increased capabilities with syslog collection functionality (I can be wrong here.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm also not sure about agent-less' ability&amp;nbsp;to employ credential guard protections.&amp;nbsp; Which IMO is a requirement for deployment for anyone with a Palo firewall.&amp;nbsp; Granted getting it deployed is a PITA and extremely quirky.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I had my choice I'd go with an agent based deployment.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Jul 2018 13:56:08 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2018-07-17T13:56:08Z</dc:date>
    <item>
      <title>Agentless vs Agent based User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222123#M63893</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have 500 users on site and currently using Agentless User-ID with PANOS 7.1.7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are thinking of scaling up to Agent based.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please guide me to a link/article that discusses the Pros and Cons of both?&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are the common issues one facing with Agent based? Are there any limitations? etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jul 2018 06:13:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222123#M63893</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2018-07-13T06:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless vs Agent based User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222434#M63973</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I cant recall a pro vs con page that goes into this. Its one of those 'its your preference' things. With using agents all you are doing is offloading that aspect of the firewall to a server so you can free up some resources on the firewall, not many. We did it because we have the firewall emailing us of any high or critical events and we got spammed due to the failures, it was a WMI collision and we tried increasing resources and couldnt find a solution. Otherwise they were working the same, e.g. identifying users, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 21:41:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222434#M63973</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-07-16T21:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless vs Agent based User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222439#M63977</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45418"&gt;@Farzana&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Biggest thing is going to be that with the agentless method the constant log queries on the domain controller can be resource intensive for those servers, the resources required by the firewall to monitor the logs are actually pretty low. That being said&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;is correct, it's really a personal preference thing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jul 2018 22:01:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222439#M63977</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-07-16T22:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless vs Agent based User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222537#M63991</link>
      <description>&lt;P&gt;In an agent based user-id deployment the UIA queries&amp;nbsp;the defined DC and collects all the logs which are new since the last update interval and discards&amp;nbsp; all but the required event IDs for user-ID mappings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In an agentless deployment the firewall only collects the necessary event IDs for user-ID mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also thought there was some increased capabilities with syslog collection functionality (I can be wrong here.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm also not sure about agent-less' ability&amp;nbsp;to employ credential guard protections.&amp;nbsp; Which IMO is a requirement for deployment for anyone with a Palo firewall.&amp;nbsp; Granted getting it deployed is a PITA and extremely quirky.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I had my choice I'd go with an agent based deployment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 13:56:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222537#M63991</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-07-17T13:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless vs Agent based User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222556#M63997</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I don't think that you actually have any limitations with the syslog collection when using the agentless; it is a tad bit harder generally to verify everything is working however.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe that the only time that you actually need to utilize the User-Agent&amp;nbsp;is if you decide to use the domain credential method. This would require that you are actually using the agent instead of agentless; as the agentless method can't validate whether a valid password was being used.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm personally not really a fan of domain credential filter as it would only detect when a user is submitting both a valid username and password and that the user logged into the source-ip matches those credentials. My thought process on this method is that I would rather know if any valid user-id is being submitted, regardless if the password is valid or if it matches the mapped source-user.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 16:06:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222556#M63997</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-07-17T16:06:57Z</dc:date>
    </item>
    <item>
      <title>Re: Agentless vs Agent based User-ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222558#M63999</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm personally not really a fan of domain credential filter as it would only detect when a user is submitting both a valid username and password and that the user logged into the source-ip matches those credentials. My thought process on this method is that I would rather know if any valid user-id is being submitted, regardless if the password is valid or if it matches the mapped source-user.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can do either type deployment...The more broad deployment will block known IP to known user ID without regard for a valid password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason for not blocking this is you can't necessarily control if a user, however stupidly, decides to user their domain user ID for some Internet based hosted service.&amp;nbsp; At my company a lot of people user this ID for company driven cloud/Internet based services.&amp;nbsp; (We're in the process of whitelisting these sites.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I actually like the "domain credential filter" because it's less intrusive and is more specific to what we're trying to block.&amp;nbsp; However the idiocrincies to get this to work makes it really difficult to get deployed.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 16:15:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/agentless-vs-agent-based-user-id/m-p/222558#M63999</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-07-17T16:15:13Z</dc:date>
    </item>
  </channel>
</rss>

