Issue with user detection on terminal server

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Issue with user detection on terminal server

L1 Bithead

Hello everyone,

 

We're having an issue with our terminal server agent software on multiple terminal servers running Windows Server 2019.

 

The problem lies in recognizing users who are logged on to these servers. The TS Agent sees the users on the Terminal Server Agent Monitor tab, but they do not appear in the traffic log in the Firewall Source User column.

Although in the past this scenario always worked for all applications that the logged-in user was using on the server (Microsoft 365, Adobe Acrobat) now users only appear in the traffic log when using the web browser on the server.

 

We have not changed our firewall configuration or the configuration of the terminal user agents on the terminal servers.

The only thing that has changed is the LACP connection to the trust zone between the firewall and a switch.

 

User detection via the User-ID agent on our domain controller is still working properly. All users on all clients are recognized and show up in the traffic log. The exception entries for the terminal server in the User-ID Agent are still there.

 

Anyone know where the problem could be?

Why did this always work before and now only via the web browser?

 

PA 450

PAN OS 10.2.4

6 REPLIES 6

Cyber Elite
Cyber Elite

has the server been upgraded (which could cause a change in behavior), and has the TS-agent been upgraded to the latest version?

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

The server has not been upgraded since the issue. The TS-Agent is already running the newest version (11.0.102).

 

However after some more tests, we can narrow down the problem further. It seems as if logging into Office products is the only situation in which users are not recognized by the firewall. While the registration/licensing window opens, the Ts agent does not seem to be able to assign a user to the packages. After signing in, the user is recognized again while navigating through templates or add-ins in the Office software.

L0 Member

We deployed some 2019 TS servers and are getting the same issue here. Were you able to find a fix yet?

Our 2016 TS servers work fine though. We even upgraded the PAN OS to 10.2.6. Same results.

Unfortunately we don't. We contacted Palo Alto technical support through our distribution partner. We tested the solution suggestions from the Palo Alto knowledge base:

Terminal Server Agent (TSA) Advanced Configuration using Window... - Knowledge Base - Palo Alto Netw...

 

Also without success. The technical support said they need to investigate the problem further. Our AV software was also considered as a potential cause, as it rewrites the source ports. We've used the same AV software before (also on Server 2019 systems) and it ran without any problems. We were asked by PA Support to enter some commands in the CLI and send the returned information to them. We have not yet received an answer to this.

 

L1 Bithead

We have also upgraded the PA terminal Server Agent software to version - 10.2.3 and started facing the same challenges.

Sorry to hear that. Unfortunately, Palo Alto support couldn't help us. They suggested we continue working with the exception policy we built for our terminal servers that are trying to connect to O365. We still do that to this day.

  • 2618 Views
  • 6 replies
  • 2 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!