Can I enforce security based in AD Computer groups yet?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Can I enforce security based in AD Computer groups yet?

L1 Bithead

I see history here indicating the user-id agent has been blind to computer names when the group membership is added to user IDs.  The CLI DOES show the computer name as a userID (with a post-pended $) and the groups are mapped correctly to the computer group I created and dumped the computer in.

 

On the other hand the USER signed into that computer does not show the computer group as one of their member groups.

 

It looks like the base data is in the firewall but I can't get traffic or security policies to recognize the traffic from the computer name, only the AD user name.

 

Is there some way I can introduce computer names and/or computer groups into user-id based enforcement? My goal is to create a few policies based on AD computer group. Maybe custom AD groups in the Group Mappings Settings?

1 accepted solution

Accepted Solutions

Correct as of 7.1 and lower.  There's no way I know of to enumerate computer groups and apply them to a "source" or "dest" for security policy.

View solution in original post

3 REPLIES 3

L6 Presenter

At my company we make use of EDLs to accomplish.

 

We built a script which scrubs the AD groups we want.  We then bump that script againts DNS.  That DNS output is dumped into a text file on our internal network which is hosted behind IIS.  We then target the Palo to that .txt file and leverage that object in the firewall for security policy controls.

 

 

This process is cumbersome for sure, but works for us.

L1 Bithead

Brandon, thanks for the reply. I'm guessing that the pain you go through to harvest this data is a result of not having a palo-alto supported solution to this? Does anyone else have alternatives? Something in PANOS 8 maybe?

Correct as of 7.1 and lower.  There's no way I know of to enumerate computer groups and apply them to a "source" or "dest" for security policy.

  • 1 accepted solution
  • 3475 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!