Wrong user from access log

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Wrong user from access log

L2 Linker

Hello!

 

The local user Administrator is logged in on the desktop and he is not allowed to access the internet. But he can access.

When checking in Monitor on PA220, I noticed that another user appears in the Source User column and not the Administrator user.

Has anyone ever experienced this?

 

Software version 8.0.10 

 

Thank you!

 

20 REPLIES 20

L7 Applicator

the local admin account probably has nothing to do with AD so your your user ID is still seeing the account that last registered with your AD server.

Ok... but, do you know how we can solve this issue?

 

Thank you!

ooh... good point...  not sure... I'm sure someone will jump in and advise.. 

 

to confirm..

 

are you using AD for user-ID. 

Yes... I am using AD server.

 

So, let´s wait... 

 

Thanks

Have you tried this approach...

 

•Device > User Identification> User Mapping > Palo Alto Networks User-ID Agent Setup > Client Probing

You can configure the User-ID agent to perform WMI client probing for each client system that the user mapping process identifies. The User-ID agent will periodically probe each learned IP address to verify that the same user is still logged in. When the firewall encounters an IP address for which it has no user mapping, it sends the address to the User-ID agent for an immediate probe. To configure client probing settings, complete the following fields.

This option is enabled...

@BethSouza,

You'll never get local admin accounts to actually show up as a user-id, unless you poll the machine in question which would be a really odd configuration. WMI client probing can help in this case, but your user-id configuration will ignore the user unless specifically set to allow it. 

Best solution, admin accounts should be AD users that are granted administrative rights on the machine. If you are going to use local-user accounts for administrative purposes you'll have to grant at least basic tcp/80 and tcp/443 access for any unknown-user in your environement and just be sure to log it to fit in with your security needs. 

Hello Bpry,

 

we do not want local users to have access to the internet. The local administrator was able to access the internet by chance and we were surprised when we checked the PA220 log.

I think the problem is when the PA220 looks in the Domain Controller Audit log for the validation of the user who is logged into the machine. Because the local machine administrator is not registered in the Domain Controller Audit log, it takes the last user record that logged on the machine.

 

Thank you!

@BethSouza,

Correct; which is why WMI probing isn't going to help you here, as the firewall sees the old user-mapping and has no reason to immedately trigger a probe. You could potentially get around this by decreasing your timeout value, which still wouldn't eleviate the issue but would probably fit what you are aiming to do better than what you have already. 

@BPry,

 

unfortunately it did not work. 

 

Thank you.

Hello @BPry,

I logged with user "educlocal" (he doesn't has internet access and he is a local user in Windows 10.).

But he is accessing internet.

 

 

 

pa1.JPG

 

Here is the log showing the user showing by PA when local user "educlocal" access the internet.monitor.png

 

this is one of my issue.

 

Thank you!

 

 

@BethSouza,

Just because a new user logs in doesn't mean the user-id information on the firewall will automatically clear, the firewall has 0 knowledge of this event if you're just reading AD logs. Depending on a number of different configuration options ( WMI Probing Interval, User Identification Timeout Value) the mapping will stay present until it is removed or updated. 

 

So if I'm logged into a machine with 'DOMAIN\bpry' as my user-id and then log in with a local admin account, the firewall doesn't have any idea that this local-account was ever used. To account for this either the probe interval can be increased if using WMI, or the identication timeout value can be decreased. Each option has downsides:

 

WMI Probing:

- Some find it difficult to setup

- Setting a short WMI Probe interval will cause a large amount of network traffic to all devices.

 

User Identifcation Timeout:

- Depending on the source of the user-id logs a short timeout value isn't possible if you wish to maintain user-id mappings.

- Setting an artifically high value can also cause issues.

 

When you're using local accounts there isn't a good way to solve the issue that you are running into. You simply aren't providing the firewall with the required information to update the user-id mapping. This means that regardless of what you do, there is the possibility that for a certain period of time the old user-id mapping will stay active when you log in with a local account.

To properly fix this you need to get rid of local accounts; there isn't another way to get around this issue. 

could you not run a script on local group policy that mapped a network drive to an AD share with username

 

vdn_senac_educ\restricted.user

 

this would then update User-ID to a user that would be denied internet access...

 

a bit heath robinson but workable...

 

I favour the banning of local user accounts...  

 

 

  • 6473 Views
  • 20 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!