- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Content translations are temporarily unavailable due to site maintenance. We apologize for any inconvenience.
06-02-2021 08:51 AM
I'm working on getting a Windows User-ID agent set up for a customer and it's not collecting logs. Checked all permisssions and service account user is in Event Log Readers and has permissions to both the install folder and registry entries. Just as a test, I had the customer add the service account to the domain admins group and the user mapping started populating immediately. Any permissions that I'm missing? If not, what could be wrong on the AD side preventing Event Log Readers from viewing the logs?
06-02-2021 08:53 AM - edited 06-02-2021 08:54 AM
Hello,
Check out this article. My guess is something might have been missed/overlooked?
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5bCAC
Once thing we found that worked better for us were using the Exchange logs instead. Outlook is always hitting Exchange and authenticating, so if a user moves their laptop or goes wireless, its a faster transition on the firewall side of things.
Regards,
06-02-2021 08:57 AM
Went over that document already. Nothing missed as far as I can tell.
06-02-2021 09:23 AM
Hello,
Is the service that is running the user-id agent set to run as the user/service account you setup to allow it grab logs from a DC?
Just grasping at straws, but it seems as an authentication/authorization issue.
Regards,
06-02-2021 09:29 AM - edited 06-02-2021 09:31 AM
You mean is the user configured in the user-id agent the same one in the "event log readers" group? Yes. The user configured in the agent has been added to the group, is permitted to log on as a service, has rights to the PAN folder under Program Files (x86), and has rights to the PAN registry entries listed. Like I said originally, all permissions and groups and things associated with the service account user were double and triple checked.
EDIT: You are absolutely right though that this is an authorization issue because like I said adding the same user to Domain Admins makes it work. I've done dozens of user-id installs before and this is the first time I've had it not work when all documented permissions where in place.
06-02-2021 09:35 AM
Hello,
Sorry for not making myself clear, I meant the windows service:
If that doesnt work, I'd say open a support case since you already went through everything.
Regards,
06-02-2021 09:39 AM
Oh, I'll double check that but I'm pretty sure that is the case as the agent stops and starts correctly.
06-02-2021 09:41 AM
doesn't this account require access to the security logs and not the event logs? or did i misread here...?
06-02-2021 09:46 AM
Misread I think. I was talking about adding the user to the "event log readers" group as mentioned in documentation.
06-02-2021 10:12 AM
Yes, the user is in those groups.
06-02-2021 10:16 AM
Hmm odd,,, i will double check mine in the morning as we have 4 agents hammering away nicely on both windoze servers and local.
are your agents on servers or local....????
06-02-2021 10:18 AM
Agents installed on Windows Servers. They connect to the firewall fine. Services start and stop fine. DCs are populated in the interface. Just no user mappings. I think I'll recommend this customer contact TAC.
06-03-2021 02:37 AM
OK just FYI,,, we had to add add user rights "Manage auditing and security log" to the service account for this to work but cant remember exactly why as it was a while ago...
06-03-2021 05:15 AM
You mean under "User Rights Assignment" in group policy? I already thought of that and tried it. It didn't appear to work. Customer opened a case yesterday. We'll see what support says.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!