- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
10-08-2021 06:55 AM
For some reason the Agent stopped working on the end user computer. when i checked the event log i came with an error for the id 10036 ( The server-side authentication level policy does not allow the user domain\user SID (X-X-X-XX-XXXXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXXX) from address xxx.xxx.xxx.xxx to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application ).
Can i know how to resolve this issue
10-21-2021 04:53 PM
@HutchisonPorts @PavanT @DarrinH @BPry
Managed to fix this issue with a workaround, by configuring the firewall to use WinRM-http over Kerberos. Reference links below:
10-09-2021 08:25 PM
A couple months back Microsoft pushed out an update that did some DCOM hardening that you are running into (KB5004442). I'm guessing you or your server team finally got around to patching your servers and enabled the registry key. My guess is that you are using an outdated version of PAN-OS or the User-ID agent, because I don't recall having to do anything about this particular patch and I can't find the advisory that was sent out about it.
10-10-2021 06:43 PM - edited 10-10-2021 06:45 PM
10-13-2021 07:57 AM - edited 10-13-2021 07:58 AM
We are experiencing the same problem. Just installed Microsoft Patch Tuesday updates on our Domain Controllers. Now getting the Windows Event ID 10036. "The server-side authentication level policy does not allow the user DOMAIN\userid SID () from address <> to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application." Anyone else out there getting these errors or have a solution? Our Paloalto PA-3050 is current on all updates, running version 9.1.11 of the software.
10-20-2021 10:30 PM
Hi All,
Yes, I have a client that has just patched their Windows 2016 servers and is now receiving the same error. Client is running PAN OS 9.1.11-h2 and User-ID agent 9.1.11-h2 on PA-3020 (latest available for this model device).
Tried the below Reg key to no avail:
And this to no avail:
Component services > computers > My computer > properties > set default properties > change default authentication level to 'packet integrity' rather than 'connect'
@BPry @nikoolayy1 Any ideas here?
10-21-2021 06:19 AM
I am Having the problem also with two different pan-os 9.1.3 and 10.0.4
10-21-2021 04:53 PM
@HutchisonPorts @PavanT @DarrinH @BPry
Managed to fix this issue with a workaround, by configuring the firewall to use WinRM-http over Kerberos. Reference links below:
11-02-2021 02:04 AM
Ben I'm trying to do the same, and I followed the links down to the last detail, and I'm getting connection refused(0). Any ideas?
11-02-2021 05:25 PM
@echahine where are you seeing that error? can you provide a screen shot or log file?
11-03-2021 02:01 AM
First I'm seeing a connection refused on the GUI (image attached), and the error we're getting in the logs is connection failed, error code=0
11-03-2021 05:50 AM
The Problem we are having is on the user computers,
If you go to Event viewer --> Windows Logs --> System and look for events related to 10036
11-03-2021 05:55 AM
We are having the authentication error 10036 when using WMI, and we can't solve it. What we're trying to do now is to switch to WinRM-HTTP, its not even connecting to the AD server in the first place.
11-16-2021 10:39 AM
In order to use WinRM-HTTP, you need to make sure your PA service account in AD has been added to the "Remote Management Users" group. You also have to configure a Kerberos Server Profile on the device tab in the PA. Just create a new Kerberos profile, and add the FQDN of all of your domain controllers to it. Once that is done, you have to apply that Kerberos Server Profile by clicking the 'gear' icon in the Palo Alto Networks User-ID Agent Setup area under Device > User Identification. (select it using the drop-down) Once you commit those changes, your DCs under Server Monitoring should show "Connected" instead of "Connection Refused".
12-28-2021 01:04 PM
Hey I have the same error, I made the solution that palo alto sends but have no luck, i get that error, could you manage to resolve the issue???
02-07-2022 03:08 PM
Hey, to the people having issues with Kerberos.
Step 6 indicates RC4 is not a supported cipher. Have you confirmed your Windows Server is no longer defaulting to RC4?
If someone could test and update the thread that would help the rest.
- Configure Server Monitoring Using WinRM
- Windows Configurations for Kerberos Supported Encryption Type | Microsoft Docs
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!