<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID Group Mapping not working in a security policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405456#M92012</link>
    <description>&lt;P&gt;ok so the reason why the rule with the group is not working is because it is a domain group and your user auth does not contain the domain info as mentioned earlier, you need to find out why this causes an issue to your login when added.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i will test in my lab and update later today.&lt;/P&gt;</description>
    <pubDate>Fri, 07 May 2021 11:04:21 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2021-05-07T11:04:21Z</dc:date>
    <item>
      <title>User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405308#M91992</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have searched and found similar posts but none seem to have a working solution for this...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a simple security policy to deny access to a VM located in the 'trust' zone if it matches a user in the user group created on the AD server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've confirmed with 'show user group name' that the firewall can indeed see the correct users in the group but when applying that group to the deny policy i'm not getting a hit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 19:30:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405308#M91992</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-06T19:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405318#M91993</link>
      <description>&lt;P&gt;First thing is, does the user actually have an IP mapping? A group mapping alone isn't enough for this to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show user ip-user-mapping all&lt;/P&gt;&lt;P&gt;Or check the traffic log historically for the time you tested it, does the 'src user' field have a value or not?&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 19:55:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405318#M91993</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2021-05-06T19:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405330#M91995</link>
      <description>&lt;P&gt;Yes the user has an IP mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user is accessing via GlobalProtect VPN which drops the user into 'VPN_Zone'. There's no issues with VPN connectivity and the user can access everything in the 'trust' zone which I can confirm in the logs. Yes their username is showing under 'src user'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then place a rule above the 'allow all' rule I have for VPN users to access resources in the 'trust zone'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This deny rule to block access to a specific IP address contains the users group on the AD directory. The same group that contains the user that is connected via the VPN successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 20:52:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405330#M91995</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-06T20:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405375#M91997</link>
      <description>&lt;P&gt;It sounds like there may be a mismatch between IP and group mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please check the domain/username formats between:&lt;/P&gt;&lt;P&gt;&amp;gt; Show user Ip-user-mapping all&lt;/P&gt;&lt;P&gt;&amp;gt; Show user user-ids all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And are you overriding domain in the auth profile or group mapping settings? Is so, are they set to the same thing? If not, you may need to override one or the other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 22:54:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405375#M91997</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2021-05-06T22:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405379#M91998</link>
      <description>&lt;P&gt;The output of the commands you recommended shows that the user with the IP address is indeed the same as the user in the AD group. All output is as expected. This is a lab setup so I only have one group and I can see the username is correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No I'm not overriding domain in auth profile or group mapping. I thought the firewall automatically detected the domain from the server profile? I've left 'User Domain' blank and 'Username Modifier' as the default '%USERINPUT%' in auth profile and group mapping.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Thu, 06 May 2021 23:40:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405379#M91998</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-06T23:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405441#M92005</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Yes their username is showing under 'src user'.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;does the username begin with userdomain\&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;if not then you will need to add the domain name into the auth profile&amp;nbsp; "User Domain".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 09:48:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405441#M92005</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-07T09:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405449#M92007</link>
      <description>&lt;P&gt;If I enter the domain in the auth profile&amp;nbsp; 'User Domain' field then it messes up the VPN setup and the user can no longer connect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment the user authenticates to the LDAP server successfully when connecting via GlobalProtect and can access resources on the network. This tells me there is nothing wrong with reaching the AD server and authenticating the user in the user group. The user gets an IP and can access resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When logged in as the user via the GlobalProtect VPN I can see in the traffic log it's successfully showing the correct 'source user' as I connect to different network resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I don't understand why is if I then try to create a rule blocking that user from accessing a specific IP on the network it doesn't work. I know the rule is working because if I remove the 'Source User' part of the rule I get hits and it shows the correct user in the log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 10:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405449#M92007</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-07T10:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405453#M92010</link>
      <description>&lt;P&gt;ok lets go back a step....&amp;nbsp; &amp;nbsp;do you actually have a rule that allows that AD group access to the network?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or is it just allowed by source zone or individual user?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 10:49:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405453#M92010</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-07T10:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405455#M92011</link>
      <description>&lt;P&gt;At present anyone connecting in via VPN can access the network via an 'allow any' rule from 'SSL_VPN' zone to the 'trust' zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've placed a rule above that rule to deny access to one IP address on the network if the source user is in the 'hpslab\globalprotect-vpnusers' group. This group has been pulled from the AD server and contains the user that I'm logged in via the VPN to test with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as it stands at the moment I can still access the '192.168.50.1' IP and the deny rule isn't working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Screenshot 2021-05-07 at 11.56.30.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33720iA73E9250650FBCBB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2021-05-07 at 11.56.30.png" alt="Screenshot 2021-05-07 at 11.56.30.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 11:01:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405455#M92011</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-07T11:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405456#M92012</link>
      <description>&lt;P&gt;ok so the reason why the rule with the group is not working is because it is a domain group and your user auth does not contain the domain info as mentioned earlier, you need to find out why this causes an issue to your login when added.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i will test in my lab and update later today.&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 11:04:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405456#M92012</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-07T11:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405457#M92013</link>
      <description>&lt;P&gt;Thanks for your help Mick&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 11:05:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405457#M92013</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-07T11:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405476#M92015</link>
      <description>&lt;P&gt;If the domain format matches in IP mapping and Group mapping, then you can check the user's attributes. I would go through like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does domain format(fqdn vs flat netbios) and username match under these two:&lt;/P&gt;&lt;P&gt;&amp;gt; show user group name &amp;lt;group dn&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show user ip-user-mapping &amp;lt;all|ip x&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see a mismatch with the Primary or Alt attributes (specifically domain fqdn vs netbios) compared with the previous commands?&lt;/P&gt;&lt;P&gt;&amp;gt; show user user-attributes user &amp;lt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also check that you have a domain map shortening the fqdn to netbios:&lt;/P&gt;&lt;P&gt;&amp;gt; debug user-id dump domain-map&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 12:55:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405476#M92015</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2021-05-07T12:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405508#M92017</link>
      <description>&lt;P&gt;As per&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131231"&gt;@dmifsud&lt;/a&gt;&amp;nbsp;advice, here is my output for both group and ip mapping. They both have domain prefix. Can you post your results of the same commands.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MickBall_1-1620400080134.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33722iC66F83949D2BA4D0/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="MickBall_1-1620400080134.png" alt="MickBall_1-1620400080134.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 15:08:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405508#M92017</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-07T15:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405521#M92018</link>
      <description>&lt;P&gt;Thanks... heres some output:&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 16:08:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405521#M92018</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-07T16:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405522#M92019</link>
      <description>&lt;P&gt;Ok some good info...&lt;/P&gt;&lt;P&gt;the user ip mapping ggrant does not have the domain prefix so using domain groups will not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this will work if you add the domain to the authentication profile, this is what i do for my ipads and domain authentication works fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 15:51:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405522#M92019</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-05-07T15:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405523#M92020</link>
      <description>&lt;P&gt;Holy moly it worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added the domain in the auth profile and left the username modifier as the default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried this yesterday but changed the modifier to %USERDOMAIN%/%USERINPUT% and it didn't work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks all for your help on this.&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 16:05:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/405523#M92020</guid>
      <dc:creator>G.Grant</dc:creator>
      <dc:date>2021-05-07T16:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/508982#M105936</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if there is a way to remove the domain name from the group mapping&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my case:&lt;/P&gt;
&lt;P&gt;show user group name emea.com\test&lt;/P&gt;
&lt;P&gt;short name: emea.com\test&lt;/P&gt;
&lt;P&gt;source type: ldap&lt;BR /&gt;source: test&lt;/P&gt;
&lt;P&gt;[1 ] emea.com\test1&lt;BR /&gt;[2 ] emea.com\test2&lt;BR /&gt;[3 ] emea.com\test3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i only need from the group mapping the name "test1 or "test2" or "test3"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason why is because i get from external source on palo alto the user id test1 or "test2" or "test3"&lt;/P&gt;
&lt;P&gt;The goal is create a policy rule base on the source user that is being part of a domain group&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i expend hours and there is no way to understand or found the reason why palo alto get from ldap group mapping "domain name + name"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 17:21:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/508982#M105936</guid>
      <dc:creator>alvaroarcaz</dc:creator>
      <dc:date>2022-07-14T17:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/508985#M105938</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please could you detail this a bit? I had a similar situation and not follow what is your solution even on the original post!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 17:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/508985#M105938</guid>
      <dc:creator>alvaroarcaz</dc:creator>
      <dc:date>2022-07-14T17:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Group Mapping not working in a security policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/539575#M110685</link>
      <description>&lt;P&gt;I'm experiencing a similar situation where using the internal USER-ID agent and mapping to three (3) server monitor domain controllers. Recently a user was denied access, and when searching the monitor traffic I noticed the there was no user mapping associated with the traffic. However, when I search the monitor&amp;gt;User ID, it shows that the firewall new of a user-mapping between I and user during that specific time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;note: When looking at monitor &amp;gt; User ID, I do notice that of the 3 server monitor, the user mapping only sources from 2 of the 3 domain controllers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If anyone can provide some insight, this would be helpful. Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 17:00:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-group-mapping-not-working-in-a-security-policy/m-p/539575#M110685</guid>
      <dc:creator>JScottNaviH</dc:creator>
      <dc:date>2023-04-20T17:00:32Z</dc:date>
    </item>
  </channel>
</rss>

