<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Denied (Server Monitor) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258358#M73282</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107470"&gt;@shafi.md&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I presume that you use the build-in User-ID agent. This normally happens, when you have not added the AD account used by the firewall to account with rights to read the WMIC address space.&lt;/P&gt;&lt;P&gt;You need to repeat it on each monitored server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Right-click the Windows icon ( png ), Search for wmimgmt.msc, and launch the WMI Management Console.&lt;/LI&gt;&lt;LI&gt;In the console tree, right-click WMI Control and select Properties.&lt;/LI&gt;&lt;LI&gt;Select Security, select RootCIMV2, and click Security.&lt;/LI&gt;&lt;LI&gt;Add the name of the service account you created, Check Names to verify your entry, and click OK.&lt;/LI&gt;&lt;LI&gt;You might have to change the Locations or click Advanced to query for account names. See the dialog help for details.&lt;/LI&gt;&lt;LI&gt;In the Permissions for &amp;lt;Username&amp;gt; section, Allow the Enable Account, and Remote Enable permissions.&lt;/LI&gt;&lt;LI&gt;Click OK twice.&lt;/LI&gt;&lt;LI&gt;Use the Local Users and Groups MMC snap-in (lusrmgr.msc) to add the service account to the local Distributed Component Object Model (DCOM) Users and Remote Desktop Users groups on the system that will be probed.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/create-a-dedicated-service-account-for-the-user-id-agent.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/create-a-dedicated-service-account-for-the-user-id-agent.html#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Apr 2019 12:02:05 GMT</pubDate>
    <dc:creator>BatD</dc:creator>
    <dc:date>2019-04-23T12:02:05Z</dc:date>
    <item>
      <title>Access Denied (Server Monitor)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258171#M73235</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I configured the Base name and bind name properly but we facing the following error in putty “pan_user_id_win_get_error_status(pan_user_id_win.c:1130): WMIC message from server AD-Monitor: NTSTATUS: NT_STATUS_ACCESS_DENIED - Access denied” and&amp;nbsp; “pan_user_id_win_wmic_log_query(pan_user_id_win.c:1439): log query for AD-Monitor failed: NTSTATUS: NT_STATUS_ACCESS_DENIED - Access denied”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Apr 2019 06:46:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258171#M73235</guid>
      <dc:creator>shafi.md</dc:creator>
      <dc:date>2019-04-21T06:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: Access Denied (Server Monitor)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258196#M73239</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107470"&gt;@shafi.md&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you look at the server and verify the setting of 'Network security: LAN Manager authentication level'&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2019 03:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258196#M73239</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-04-22T03:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Access Denied (Server Monitor)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258358#M73282</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107470"&gt;@shafi.md&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I presume that you use the build-in User-ID agent. This normally happens, when you have not added the AD account used by the firewall to account with rights to read the WMIC address space.&lt;/P&gt;&lt;P&gt;You need to repeat it on each monitored server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Right-click the Windows icon ( png ), Search for wmimgmt.msc, and launch the WMI Management Console.&lt;/LI&gt;&lt;LI&gt;In the console tree, right-click WMI Control and select Properties.&lt;/LI&gt;&lt;LI&gt;Select Security, select RootCIMV2, and click Security.&lt;/LI&gt;&lt;LI&gt;Add the name of the service account you created, Check Names to verify your entry, and click OK.&lt;/LI&gt;&lt;LI&gt;You might have to change the Locations or click Advanced to query for account names. See the dialog help for details.&lt;/LI&gt;&lt;LI&gt;In the Permissions for &amp;lt;Username&amp;gt; section, Allow the Enable Account, and Remote Enable permissions.&lt;/LI&gt;&lt;LI&gt;Click OK twice.&lt;/LI&gt;&lt;LI&gt;Use the Local Users and Groups MMC snap-in (lusrmgr.msc) to add the service account to the local Distributed Component Object Model (DCOM) Users and Remote Desktop Users groups on the system that will be probed.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/create-a-dedicated-service-account-for-the-user-id-agent.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/create-a-dedicated-service-account-for-the-user-id-agent.html#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2019 12:02:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/258358#M73282</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-04-23T12:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: Access Denied (Server Monitor)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/259595#M73592</link>
      <description>&lt;P&gt;Still Same issue (Access Denied)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Output&lt;/P&gt;&lt;P&gt;2019-05-01 08:59:20.280 +0530 Error: pan_user_id_win_wmic_sess_query(pan_user_id_win.c:1588): session query for 192.168.0.212 failed: NTSTATUS: NT_STATUS_ACCESS_DENIED - Access denied&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have integrate one more firewall with server 2008, that is working fine,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The above error i am getting from firewall after running this command (less mp-log useridd.log), integration with server 2012 r2&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 09:54:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/259595#M73592</guid>
      <dc:creator>shafi.md</dc:creator>
      <dc:date>2019-05-02T09:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access Denied (Server Monitor)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/448494#M100824</link>
      <description>&lt;P&gt;I have two problems:&amp;nbsp;&lt;/P&gt;&lt;P&gt;2021-11-18 12:18:06.656 -0600 Error: pan_user_id_win_wmic_sess_query(pan_user_id_win.c:1748): session query for USER-ID failed: NTSTATUS: NT code 0x80041003 - NT code 0x80041003&lt;/P&gt;&lt;P&gt;2021-11-18 12:18:06.656 -0600 Error: pan_user_id_win_get_error_status(pan_user_id_win.c:1275): WMIC message from server USER-ID: NTSTATUS: NT code 0x80041003 - NT code 0x80041003&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any solution?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Nov 2021 18:22:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/448494#M100824</guid>
      <dc:creator>AbrahamCanul</dc:creator>
      <dc:date>2021-11-18T18:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access Denied (Server Monitor)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/509574#M106083</link>
      <description>&lt;P&gt;&lt;SPAN&gt; &amp;gt;&amp;gt; mp useridd.log 2022-07-22 05:53:28.324 +0400 Error: pan_user_id_win_wmic_log_query(pan_user_id_win.c:1603): log query for server1.local failed: NTSTATUS: NT_STATUS_ACCESS_DENIED - Access denied&lt;BR /&gt;&lt;BR /&gt;&amp;gt;&amp;gt;mp useridd.log 2022-07-22 05:53:28 2022-07-22 05:53:28.324 +0400 Error: pan_user_id_win_get_error_status(pan_user_id_win.c:1288): WMIC message from server server1.local: NTSTATUS: NT_STATUS_ACCESS_DENIED - Access denied &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;We checked this issue further and found the reason as a recent patch release from Microsoft &lt;A href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank" rel="noopener" data-aura-rendered-by="60:37417;a"&gt;KB5004442&lt;/A&gt;&amp;nbsp;which impacts the WMI transport service used from the FW side. &lt;BR /&gt;We checked the same with the Server Team and could correlate the patch installation and the mapping failure timestamps. &lt;BR /&gt;A detailed description of the issue along with the resolution is provided in the articles below: &lt;/SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkkfCAA&amp;amp;lang=en_US%E2%80%A9" target="_blank" rel="noopener" data-aura-rendered-by="60:37417;a"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkkfCAA&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank" rel="noopener" data-aura-rendered-by="60:37417;a"&gt;https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 08:47:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-denied-server-monitor/m-p/509574#M106083</guid>
      <dc:creator>nislam</dc:creator>
      <dc:date>2022-07-22T08:47:51Z</dc:date>
    </item>
  </channel>
</rss>

