<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic UserID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255137#M72410</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is Userd Identification feature works only whith Active Directory users account or also with Computers accounts ? I would like to create a security rule who allow access on our internal ressources only for computer with an active computer account in our AD and for computer without an valid computer account or disable account, the traffic must be blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2019 06:43:11 GMT</pubDate>
    <dc:creator>CARRIERJerome</dc:creator>
    <dc:date>2019-03-27T06:43:11Z</dc:date>
    <item>
      <title>UserID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255137#M72410</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is Userd Identification feature works only whith Active Directory users account or also with Computers accounts ? I would like to create a security rule who allow access on our internal ressources only for computer with an active computer account in our AD and for computer without an valid computer account or disable account, the traffic must be blocked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2019 06:43:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255137#M72410</guid>
      <dc:creator>CARRIERJerome</dc:creator>
      <dc:date>2019-03-27T06:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: UserID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255163#M72413</link>
      <description>&lt;P&gt;You cannot use host level information to enforce security policy.&amp;nbsp; (ie computer group membership, or lack there of)&lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2019 17:26:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255163#M72413</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-03-27T17:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: UserID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255324#M72462</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84878"&gt;@CARRIERJerome&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You could build something like this with a dynamic group, address objects, and the XML API fairly easily that you could update on a scheduled basis. However, as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;says this isn't something natively supported by the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 21:09:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255324#M72462</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-03-28T21:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: UserID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255325#M72463</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84878"&gt;@CARRIERJerome&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You could build something like this with a dynamic group, address objects, and the XMLAPII fairly easily that you could update on a scheduled basis. However, as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;says this isn't somethingnativelyy supported by the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yeah there's definitely "a way" to do it, but it's not native feature set.&amp;nbsp; I actually had this requirement about 5 years back and got it implemented at my company using an&amp;nbsp;EDL or back then it was a "dynamic block list."&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you query&amp;nbsp;the computer AD security group via a script, dump that script to a file, then perform an NSLOOKUP of those&amp;nbsp;hostnames&amp;nbsp;dump that IP address into another file.&amp;nbsp; This file which has the IP addresses can be used in the&amp;nbsp;EDL on&amp;nbsp;Palo.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 21:25:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/userid/m-p/255325#M72463</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-03-28T21:25:01Z</dc:date>
    </item>
  </channel>
</rss>

