<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identify syslog type for User-ID parse in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299183#M78339</link>
    <description>&lt;P&gt;The UserID agent&amp;nbsp; can already parse traffic from the Security log on your DC.&lt;/P&gt;&lt;P&gt;Can you please explain the need for syslog parsing, when the solution already has the native ability to do it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would use the syslog parsing for Linux/Unix (PAMs or Portable Authentication Module), or Aerohive APs, and the rest of the default parsers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For you, a service account with Event Log Readers, Service Operator Priviledges, and Distributed COM User is what is needed to read Microsoft logs, natively.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Nov 2019 19:10:25 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2019-11-18T19:10:25Z</dc:date>
    <item>
      <title>Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299173#M78337</link>
      <description>&lt;P&gt;I'm in the process of implementing User-ID and want to parse syslog logs. the predefined parse profile don't appear to be a match, as I'm looking to pull syslog from my domain controller. However, my Active Directory team can't provide me with a sample of the syslog event or tell me the type of syslog (regex or field) being generated. So I'm looking from some additional information about to identify the type of syslog file to help push this process along. Anything would be helpful. Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 18:51:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299173#M78337</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-18T18:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299183#M78339</link>
      <description>&lt;P&gt;The UserID agent&amp;nbsp; can already parse traffic from the Security log on your DC.&lt;/P&gt;&lt;P&gt;Can you please explain the need for syslog parsing, when the solution already has the native ability to do it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would use the syslog parsing for Linux/Unix (PAMs or Portable Authentication Module), or Aerohive APs, and the rest of the default parsers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For you, a service account with Event Log Readers, Service Operator Priviledges, and Distributed COM User is what is needed to read Microsoft logs, natively.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 19:10:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299183#M78339</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-18T19:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299212#M78342</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My rationale is that of the default Syslog filters (Aerohive AP, Unix, Citrix, etc.), Microsoft Domain Controllers are not listed. My goal is to leverage syslog events to conduct user to IP&amp;nbsp;mappings. I didn't adding all default files to a server monitor would provide the expected results. Please let me know if I missed something here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as a service account: I've found with my AD team and it doesn't that I'm getting access to Service Operator Privileges. According to Palo Alto, I should "need" access to Server Operator for User-ID to function.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2019 20:46:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299212#M78342</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-18T20:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299581#M78375</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84305"&gt;@JermaineScott&lt;/a&gt;, what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;is saying is that there is no MS AD Syslog parser because we don't do general Syslog scraping for MS AD. PAN-OS actually talks natively to the DC to gather the information as it is much more effective and efficient. In short, take a look at the User-ID documentation,&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id.html&lt;/A&gt;&amp;nbsp;is PAN-OS 9.0 doc, as there is some great information on how to configure User-ID to talk to your AD DCs and gather the appropriate information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are special Syslog parsers, as identifed, that have been created to look for specific information from these specific sources because that is the only way to gather information needed to do IP Mapping. It is also then leaning on receiving Syslog messages, not the most reliable mechanism.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have further questions after reviewing the documentation please do post, a lot of smart folks out here... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2019 21:56:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/299581#M78375</guid>
      <dc:creator>ddelcourt</dc:creator>
      <dc:date>2019-11-19T21:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300616#M78537</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/69398"&gt;@ddelcourt&lt;/a&gt;&amp;nbsp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your responses, I realized that misunderstood what you both were saying and probably didn't provide enough insight into my situation.&lt;/P&gt;&lt;P&gt;So to start, I do understand that the Palo Alto is able to speak directly with the Active Directory servers. I've&amp;nbsp;implemented&amp;nbsp;that setup on multiple occasions. During this new setup instance&amp;nbsp;running into a little hang up. I'm getting very limited mappings, about 100 users&amp;nbsp;from what I expected to be a&amp;nbsp;couple thousand users. So as we troubleshoot&amp;nbsp;we find out.&lt;/P&gt;&lt;P&gt;1) The Activate Directory team is not allowing the Service account&amp;nbsp;access to Server Operator privileges. However, speaking with Palo&amp;nbsp;TAC,&amp;nbsp;it's said that the function should still work.&lt;/P&gt;&lt;P&gt;2) After troubleshooting with Palo TAC we found out the Active Directory&amp;nbsp;servers do not Audit successful logon events. which would be required for the Palo Alto to read the logs. Apparently the servers can't handle the load of that many logs, and there's no plan to upgrade any time soon. This is a bit confusing, because I wondered why I'm getting any logs at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So now management wants to know (because our syslog&amp;nbsp;server (Qradar) has logs/events that contain username and IP address coming from the domain controller), if&amp;nbsp;the Palo Alto&amp;nbsp;can pull the same&amp;nbsp;syslog events being sent from the&amp;nbsp;Domain Controller to the syslog server&amp;nbsp;into the firewall to be used for User-ID mapping. That's why I have been trying to parse syslog files from&amp;nbsp;the domain controller.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does this make sense to any of you? An if so, am I going about it the right way?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 17:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300616#M78537</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-25T17:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300627#M78541</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84305"&gt;@JermaineScott&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Glad to assist you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using the builit in UserID agent or the standalone version (that you would have installed on your DC or another domain'd server)&lt;/P&gt;&lt;P&gt;Why is the MS not allowed ServerOperator Privs?&amp;nbsp; I understand that the UserID can limp along without, but what is the security concern from the MS team?&amp;nbsp; Did they have any issues with providing Distributed COM User?&amp;nbsp; You should go back and check this one as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are missing mappings, then I would use the standalone version.&amp;nbsp; I would configure the timeout timer to be 240 minutes (4 hours) and ALSO, your DHCP scopes should be reduced to 1 day (8 hour to 12 hours) and not 3 to 8 days (as I have seen it before).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The standalone also looks at the last 50k of security logs (looking for login/logff requests).&amp;nbsp; Are you stating that the Security Log (part of the Event Logs on the DC) cannot keep up with the amount of users logging into the DC?&amp;nbsp; &amp;nbsp;That is very strange, as the PANW solution can handle 100 DC/Exchange servers, so yes, the limiting factor could be your servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The probing function is another way to find missing windows machines (no userID info), but that requires the Distributed COM User privilege.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could configure GlobalProtect with always on (and not provide an internal gateway) and now all users would authenticate to the FW (and to your LDAP server) so that you would get logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could enable authentication policies (a good thing!!!) to safely/securely allow access to internal web servers, after a person authenticated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are many different ways to get log info... Maybe a different UID technique is needed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 18:10:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300627#M78541</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-25T18:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300782#M78566</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your feedback. See my answers to your inquiries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using the builit in UserID agent or the standalone version (that you would have installed on your DC or another domain'd server)&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;I'm using the Built-in User ID Agent.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Why is the MS not allowed ServerOperator Privs?&amp;nbsp; I understand that the UserID can limp along without, but what is the security concern from the MS team?&amp;nbsp; Did they have any issues with providing Distributed COM User?&amp;nbsp; You should go back and check this one as well.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;The AD team has a security concern that a Service Account with that level of access can begin opening and closing user sessions. So the they feel that could be a threat, especially if someone or some thing was able to get access to the service accounts password. After troubleshooting, Palo TAC said that access to Server Operator wasn’t necessary for User-ID to work, so I lost my ground in that battle. Might be worth revisiting if I can prove that this is the only way to get User-ID to function properly.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;No issues getting access&amp;nbsp;to Distributed COM.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are missing mappings, then I would use the standalone version.&amp;nbsp; I would configure the timeout timer to be 240 minutes (4 hours) and ALSO, your DHCP scopes should be reduced to 1 day (8 hour to 12 hours) and not 3 to 8 days (as I have seen it before).&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;There are 13 domain controllers in three different location. So, would I have to install a standalone on each server, or just one per location? (like I planned with the built-in agents).&amp;nbsp; &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;As much trouble as I'm having collaborating between teams, I'd rather not rely on&amp;nbsp;having access to another teams server, if I don't have to.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The standalone also looks at the last 50k of security logs (looking for login/logff requests).&amp;nbsp; Are you stating that the Security Log (part of the Event Logs on the DC) cannot keep up with the amount of users logging into the DC?&amp;nbsp; &amp;nbsp;That is very strange, as the PANW solution can handle 100 DC/Exchange servers, so yes, the limiting factor could be your servers.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;The argument from the AD team’s perspective is that “to activate Auditing for successful logon/logoff would mean that the server would store successful logon/logoff information for a period of time, and given the amount of users on the network, they fear that the stored logs would be more than the servers could handle.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The probing function is another way to find missing windows machines (no userID info), but that requires the Distributed COM User privilege.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;I read in multiple places enabling probing was no recommended and an older practice. Fortunately I’m aware of all the Windows Domain controllers in the network&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could enable authentication policies (a good thing!!!) to safely/securely allow access to internal web servers, after a person authenticated.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;I considered this with Captive Portal, but the limitation I encountered was&amp;nbsp;that I’m mappings of North/South traffic of users accessing the internet but not east/west amongst the data centers.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;There are many different ways to get log info... Maybe a different UID technique is needed.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;Syslog parsing is my second option. If this get&amp;nbsp;the FW&amp;nbsp;to pull syslogs from the DC or have the Syslog server forward traffic to&amp;nbsp;the FW (sounds backwards)&amp;nbsp;l have to approach this another way, maybe Kerberos.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;Thanks again. Any feedback is helpful.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 15:33:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300782#M78566</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-26T15:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300793#M78569</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84305"&gt;@JermaineScott&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the info...&lt;/P&gt;&lt;P&gt;So, what I see/feel/believe is that your Built-in, is not able to keep up with the amount of LDAP traffic that is being used.&lt;/P&gt;&lt;P&gt;The recommendation (surprised that TAC did not mention this) would be using the standalone version (where it will be installed on a DC or a server that is part of the domain).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also believe (in my opinion) that this warrants escalation with your company to ease the lines of communication for collaboration.&lt;/P&gt;&lt;P&gt;Our communication here, has been back and forth for about 1 week or so... which (IF) you had the support of your team, would have been able to get these resolved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not have the experience/skill to try and parse from the Syslog profile (what we originally chatting about).&lt;/P&gt;&lt;P&gt;Maybe someone else can provide their input... and that would be your MS team and/or MS TAC themselves, to help you parse out what the syslog profile should be.&amp;nbsp; PANW TAC may not be able to assist you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess.. good luck and keep us in the loop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 16:54:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300793#M78569</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-26T16:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300803#M78570</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a ton.&lt;/P&gt;&lt;P&gt;FYI: I didn't specify that I'm using&amp;nbsp;the built-in on a PA-7050. So I (we)&amp;nbsp;didn't think processor power with be a limiting issue. Unless you're saying it's the functionality of the built-in itself that can't support it.&lt;/P&gt;&lt;P&gt;I'm still chasing down some theories on how to import syslog events but If I can't get that to give the results I need&amp;nbsp;I've got a couple takeaways from our conversation that I'm going to try:&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;Secure a server to install a stand alone User-ID agent.&lt;/P&gt;&lt;P&gt;2)&amp;nbsp;Reach out to&amp;nbsp;AD teams to&amp;nbsp;conduct&amp;nbsp;do a temporary test&amp;nbsp;of adding&amp;nbsp;our Service Account to the Server Operators group for 24 hours to&amp;nbsp;see&amp;nbsp;fixes the issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for your help. I will definitely provide an update when I find a solution.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 17:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300803#M78570</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-26T17:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300811#M78572</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84305"&gt;@JermaineScott&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Always glad to assist you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be more accurate in my comment about the Server Operator Privs, I agree it will not prevent UserID from working, however.... it is one of 3 techniques used by PANW, when working with LDAP.&lt;/P&gt;&lt;P&gt;1) Event Log Reader (to read the security logs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Server Operator Privs (which is ONLY used by the FW to confirm an IP is maintaining its file/print share sessions. If your MS has issues with it, have them escalate it up to PANW, but in the meantime, it really is NOT a security concern, because your MS team controls the password.. It is not on the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) Probing... (which is not a bad thing....) using WMI.&amp;nbsp; I was surprised that your MS group provide you with an elevated privilege (normally reserved for Domain Admins...yet fumble on a more secure ServerOpPriv service. ) so that you can probe unknown IPs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other techniques that you should be investigating... Syslog profile from your wireless controllers, enabling GP (always ON with no internal gateway) so that users can authenticate to (and through) the FW.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.. and happy firewalling!!!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 17:55:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300811#M78572</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-26T17:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300842#M78584</link>
      <description>&lt;P&gt;If you have events that your can access in qradar that contain both a valid username and that IP address then you will be able to forward those events to a firewall for parsing of those messages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It doesn't make sense that there would be a built in parser for this, the firewall won't know what your message format is. If there was going to be a default, it would be for the same messages that the User-ID agent would see, which do not exist in your environment as you are not auditing auth success messages.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This is why you can write a regular expression to parse them.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you get a pcap of what the log messages look like on the wire, or a sample log from qradar, you can use something like regex101.com to help you appropriately craft the regular expressions required to capture the username and IP out of the message.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can massage the info before you forward it out of qradar, you may also be able to use field matching if you can simplify the message format.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 20:48:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300842#M78584</guid>
      <dc:creator>asilliker</dc:creator>
      <dc:date>2019-11-26T20:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300869#M78591</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/14490"&gt;@asilliker&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response. I've been able successful log event in Qradar and grab sample of the log to use for a custom parse. A few things I ran into.&lt;/P&gt;&lt;P&gt;1) When going through Palo documentation I read that that "syslog senders were the network services that authenticate users. I took this as, the syslog sender had to be&amp;nbsp;the Domain Controller and I'd have to pull the logs directly from it.&amp;nbsp;Thus, I haven't&amp;nbsp;tried to go down the path of having the Qradar forward syslog events&amp;nbsp;to the User ID Agent.&amp;nbsp;Did I interpret that incorrectly?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Another sticking point: When&amp;nbsp;attempting to create a custom parse file, Palo requires&amp;nbsp;the identification of a regex vs field type.&amp;nbsp;I don't know enough about these formats to understand which is which by just looking at the Qradar log. Do you know how to identify the type?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) Does the syslog server log into the domain controller to pull logs, or does the Domain Controller forward its logs to the syslog server? I found an article that send syslog listeners will log in and pull information, so I've setup the agent with a service account that has access to the domain controller but I haven't gotten anything, so I'm wondering if the DC needs to be&amp;nbsp;told to forward log traffic to my User ID agent. I haven't gotten much feedback from my team on how the setup actually works so still trying to figure it out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your feedback.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 22:21:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300869#M78591</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-26T22:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300895#M78596</link>
      <description>&lt;P&gt;Typically, the device that supports syslog messages sends the messages to the syslog server.&lt;/P&gt;&lt;P&gt;So think about any network piece of hardware (switch/router, wireless access controller, etc)&lt;/P&gt;&lt;P&gt;These devices would typically fwd to the IP of a syslog server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this case, your syslog server should be sending them to another syslog server (in this case, the IP of the FW mgmt)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What does a log message look like in QRadar, when the DC successfully fwds the messages to the syslog server?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 00:02:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/300895#M78596</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-11-27T00:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Identify syslog type for User-ID parse</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/301113#M78625</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Got it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for the log message in Qradar:&lt;/P&gt;&lt;P&gt;&amp;lt;13&amp;gt;Nov 27 10:37:56&amp;nbsp;x.x.10.37 AgentDevice=WindowsLog&amp;nbsp;AgentLogFile=Security&amp;nbsp;PluginVersion=7.2.9.72&amp;nbsp;Source=Microsoft-Windows-Security-Auditing&amp;nbsp;Computer={Domain.Controller.Name} OriginatingComputer=x.x.10.37&amp;nbsp;User=&amp;nbsp;Domain=&amp;nbsp;EventID=4624&amp;nbsp;EventIDCode=4624&amp;nbsp;EventType=8&amp;nbsp;EventCategory=12544&amp;nbsp;&lt;/P&gt;&lt;P&gt;RecordNumber=959957311&amp;nbsp;TimeGenerated=1574869076&amp;nbsp;TimeWritten=1574869076&amp;nbsp;Level=Log Always&amp;nbsp;Keywords=Audit Success&amp;nbsp;Task=SE_ADT_LOGON_LOGON&amp;nbsp;Opcode=Info&amp;nbsp;Message=An account&lt;/P&gt;&lt;P&gt;was successfully logged on.&amp;nbsp; Subject:&amp;nbsp; Security ID:&amp;nbsp; NULL SID&amp;nbsp; Account Name:&amp;nbsp; -&amp;nbsp; Account Domain:&amp;nbsp; -&amp;nbsp; Logon ID:&amp;nbsp; 0x0&amp;nbsp; Logon Information:&amp;nbsp; Logon Type:&amp;nbsp; 3&amp;nbsp; Restricted Admin Mode: -&amp;nbsp; Virtual&lt;/P&gt;&lt;P&gt;Account:&amp;nbsp; No&amp;nbsp; Elevated Token:&amp;nbsp; Yes&amp;nbsp; Impersonation Level:&amp;nbsp; Impersonation&amp;nbsp; New Logon:&amp;nbsp; Security ID:&amp;nbsp; {Domain\User-ID}&amp;nbsp; Account Name:&amp;nbsp; {User-ID here}&amp;nbsp; Account Domain:&amp;nbsp; {Domain.Name.Here}&amp;nbsp; Logon ID:&amp;nbsp; 0xA1D8416&amp;nbsp; Linked Logon ID:&amp;nbsp; 0x0&amp;nbsp; Network Account Name: -&amp;nbsp; Network Account Domain: -&amp;nbsp; Logon GUID:&amp;nbsp; {40724BD3-9F5D-A463-A21A-367F5AA824FF}&amp;nbsp; Process Information:&amp;nbsp; Process&lt;/P&gt;&lt;P&gt;ID:&amp;nbsp; 0x0&amp;nbsp; Process Name:&amp;nbsp; -&amp;nbsp; Network Information:&amp;nbsp; Workstation Name: -&amp;nbsp; Source Network Address:&amp;nbsp;x.x.196.115 Source Port:&amp;nbsp; 49203&amp;nbsp; Detailed Authentication Information:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Logon Process:&amp;nbsp; Kerberos&amp;nbsp; Authentication Package: Kerberos&amp;nbsp; Transited Services: -&amp;nbsp; Package Name (NTLM only): -&amp;nbsp; Key Length:&amp;nbsp; 0&amp;nbsp; This event is generated when a logon session is created. It&lt;/P&gt;&lt;P&gt;is generated on the computer that was accessed.&amp;nbsp; The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server&lt;/P&gt;&lt;P&gt;service, or a local process such as Winlogon.exe or Services.exe.&amp;nbsp; The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3&lt;/P&gt;&lt;P&gt;(network).&amp;nbsp; The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&amp;nbsp; The network fields indicate where a remote logon request&lt;/P&gt;&lt;P&gt;originated. Workstation name is not always available and may be left blank in some cases.&amp;nbsp; The impersonation level field indicates the extent to which a process in the logon session can&lt;/P&gt;&lt;P&gt;impersonate.&amp;nbsp; The authentication information fields provide detailed information about this specific logon request.&amp;nbsp; - Logon GUID is a unique identifier that can be used to correlate this&lt;/P&gt;&lt;P&gt;event with a KDC event.&amp;nbsp; - Transited services indicate which intermediate services have participated in this logon request.&amp;nbsp; - Package name indicates which sub-protocol was used among the&lt;/P&gt;&lt;P&gt;NTLM protocols.&amp;nbsp; - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 20:06:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/identify-syslog-type-for-user-id-parse/m-p/301113#M78625</guid>
      <dc:creator>JermaineScott</dc:creator>
      <dc:date>2019-11-27T20:06:59Z</dc:date>
    </item>
  </channel>
</rss>

