Procedure




Steps

To configure Agentless User-ID, first create the service account, then modify and verify security settings.

 

Configure the following on the Active Directory (AD) Server and the Palo Alto Networks device:
 

  1. Create the service account in AD, which is utilized on the device. Be sure the user is part of the following groups:
    - Distributed COM Users
    - Event Log Readers
    - Server Operators
    Note:  Domain Admin privileges are not required for the User-ID service account to function properly, see  Best Practices for Securing User-ID Deployments  for more information.

    In Windows 2003, the service account must be given the Audit and manage security log user right through a group policy. Making the account a member of the Domain Administrators group provides rights for all operations. The built-in group named Event Log Readers is not available in Windows 2003.
    A screenshot of a computer

AI-generated content may be incorrect.
     
  2. The device uses  WMI Authentication  and the user must modify the CIMV2 security properties on the AD server that connects to the device.
     
  3. Run ' wmimgmt.msc ' on the command prompt to open the console and select these properties:

A screenshot of a computer

AI-generated content may be incorrect.
 

  1. From the Security tab on WMI Control Properties:
    1.) Select the  CIMV2  folder.
    2.) Click  Security,
    3.) Click  Add  and then select the service account from Step 1.
    4.) In this case, it is  userid@pantac.lab
    5.) For this account, check both  Allow  for  Enable Account  and  Remote Enable :
    6.) Click  Apply,
    7.) Then click  OK .
    A screenshot of a computer

AI-generated content may be incorrect.
     
  2. Back in the Palo Alto WebGUI , Select  Device > User Identification > User Mapping,  then click the edit sproket in the upper right corner   to complete the Palo Alto Networks User-ID Agent Setup. A screenshot of a computer

AI-generated content may be incorrect.
  3. Be sure to configure with the domain\username format for username under  WMI Authentication  tab along with valid credentials for that user.
     
  4. Enable the  Server Monitor  options and enable the security log/enable session accordingly.
    Client probing is enabled by default, so disable if desired.
     
  5. If the domain is configured during Setup in the General Settings/Domain field, the user can elect to discover servers with which to connect. If not, manually add a server to the device: A screenshot of a computer

AI-generated content may be incorrect.
     
  6. Confirm connectivity through the WebGUI or the CLI:
  7. > show user server-monitor statistics
  8.  
  9. Directory Servers:
  10. Name TYPE Host Vsys Status
  11. -----------------------------------------------------------------------------

pantacad2003.pantac.lab AD pantacad2003.pantac.lab vsys1 Connected

A screenshot of a computer

AI-generated content may be incorrect.

  1. Confirm that ip -user-mapping is working.
  2. > show user ip -user-mapping all
  3.  
  4. IP              Vsys   From     User                            IdleTimeout (s) MaxTimeout (s)
  5. -------------- - - ---- - - ----- - - ------------------------------ - - ------------- ----------
  6. 192.168.28.15    vsys 1  AD       pantac \tom                      2576          2541
  7. 192.168.29.106   vsys 1  AD       pantac \ userid                   2660          2624
  8. 192.168.29.110   vsys 1  AD       pantac \ userid                   2675          2638

Total: 3 users

  1. Ensure  Enable User Identification  is enabled on the zones where identifiable traffic will be initiated. Select the zone in Network > Zone.
    A screenshot of a computer

AI-generated content may be incorrect.