<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: connect-server-monitor-failure in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245531#M69953</link>
    <description>&lt;P&gt;If you have so many firewalls polling only a handful AD servers, it's probably better to install agents on the AD (or one or more servers near the AD) and have the firewalls poll the agents instead, this will dramatically cut down on all the WMI probes you'll need to do&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jan 2019 13:42:12 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2019-01-10T13:42:12Z</dc:date>
    <item>
      <title>connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245440#M69945</link>
      <description>&lt;P&gt;Has anyone experienced numerous of these "connect-server-monitor-failure" alerts when using agentless user ID?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have 20+ firewalls using a few specific domain controllers to get user ID info, but these alerts are constantly, 100's an hour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems to be related to WMI memory error, but I've already increased the wmi memory, described in this article&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CltXCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CltXCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DCs are Win2k8 R2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 01:41:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245440#M69945</guid>
      <dc:creator>MikeC</dc:creator>
      <dc:date>2019-01-10T01:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245531#M69953</link>
      <description>&lt;P&gt;If you have so many firewalls polling only a handful AD servers, it's probably better to install agents on the AD (or one or more servers near the AD) and have the firewalls poll the agents instead, this will dramatically cut down on all the WMI probes you'll need to do&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 13:42:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245531#M69953</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-10T13:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245550#M69960</link>
      <description>&lt;P&gt;I agree, but I don't find 20 firewalls to be a lot.&amp;nbsp; Is this too much for agentless user-ID?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 16:40:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245550#M69960</guid>
      <dc:creator>MikeC</dc:creator>
      <dc:date>2019-01-10T16:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245559#M69962</link>
      <description>You'd need to investigate logs on your ADs to make sure but it sounds like some of the WMI arentimjngnout which could be a sign that the AD are not keeping up with the amount of requests coming from the firewalls&lt;BR /&gt;&lt;BR /&gt;If the volume is unusually high you could also look into why this is:  maybe a zone that does not have mapped IPs does have user-id enabled which will trigger a query for each unidentified IP (user-id only needs to be enabled on the 'source' zone of the identified users)</description>
      <pubDate>Thu, 10 Jan 2019 17:14:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245559#M69962</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-10T17:14:01Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245560#M69963</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;You'd need to investigate logs on your ADs to make sure but it sounds like some of the WMI arentimjngnout which could be a sign that the AD are not keeping up with the amount of requests coming from the firewalls&lt;BR /&gt;&lt;BR /&gt;If the volume is unusually high you could also look into why this is: maybe a zone that does not have mapped IPs does have user-id enabled which will trigger a query for each unidentified IP (user-id only needs to be enabled on the 'source' zone of the identified users)&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you may be on to something here, even though I keep being told no.&amp;nbsp; There is only 1 Trust zone on most of the firewalls, but there a few subnets where a user will never map. I think it can benefit from those subnets being excluded&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jan 2019 17:45:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245560#M69963</guid>
      <dc:creator>MikeC</dc:creator>
      <dc:date>2019-01-10T17:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245582#M69971</link>
      <description>That sounds like the perfect place to start!</description>
      <pubDate>Thu, 10 Jan 2019 19:05:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/245582#M69971</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-01-10T19:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/281196#M75926</link>
      <description>&lt;P&gt;I know this is a fairly old thread but curious if your investigation turned up any findings with regard to this zone enablement issue? We're having a similar issue and looking for solutions.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 18:37:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/281196#M75926</guid>
      <dc:creator>codyweber54</dc:creator>
      <dc:date>2019-08-05T18:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: connect-server-monitor-failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/281197#M75927</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85409"&gt;@codyweber54&lt;/a&gt;&amp;nbsp;I decided to use the Windows User-ID agent instead.&amp;nbsp; No more issues, since switching to that&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 18:43:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-server-monitor-failure/m-p/281197#M75927</guid>
      <dc:creator>MikeC</dc:creator>
      <dc:date>2019-08-05T18:43:05Z</dc:date>
    </item>
  </channel>
</rss>

