Global protect access issue with adm account

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Global protect access issue with adm account

L1 Bithead

Hi,

 

We have issues right now on the users with _adm account accessing the server while connected to GP.

 

Here's the scenario:

1. User connect to GP using normal ad account 

2. User is connected to GP

3. User will try to access server via RDP

4. User will input his/her _adm credential on the server

5. Upon checking the firewall level, user are being denied by the firewall because _adm kicked-in and not the normal ad account

 

hope can anyone share if you encounter this issue with GP 6.2.x

2 REPLIES 2

Community Team Member

Hi @JadeJisman ,

 

In the monitor tab, if you filter on the users' IP, do you see the source user actually change from non adm account to adm account? Can you check and share the previous traffic. 

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Hi Jay,

 

Yes I confirm the source user suddenly change after the user login to a server using adm account.

BTW, we are using UID agent and I think that is one of the cause. Our goal is to bypass all adm accounts so it will not take the full control of user traffic on the firewall level.

 

  • 269 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!