To configure Agentless User-ID, first create the necessary service account in Active Directory (AD), then modify and verify required security settings on the AD server and the Palo Alto Networks device.
Create the service account in AD that the Palo Alto Networks device will use. Ensure this user account is a member of the following AD groups:
Note: Domain Admin privileges are not required for the User-ID service account to function properly. Refer to Best Practices for Securing User-ID Deployments for more information.
In Windows Server 2003 environments, the service account must be explicitly given the “ Audit and manage security log ” user right through a group policy, as the "Event Log Readers" group does not exist. Making the account a member of Domain Admins grants all necessary rights but is generally not recommended for security best practices.
The device uses WMI Authentication . You must modify the CIMV2 security properties on the AD server(s) that the Palo Alto Networks device will connect to for monitoring.
Run
wmimgmt.msc
from the command prompt or Run dialog on the AD server to open the WMI Management console.
From the WMI Control Properties window (right-click "WMI Control (Local)" and select "Properties"):
pantac\userid
).
Log in to the Palo Alto Networks device WebGUI:
Within the User-ID Agent Setup window:
DOMAIN\username
format (e.g.,
pantac\userid
).
Within the User-ID Agent Setup window:
Still within the Server Monitor tab:
Confirm the firewall can successfully connect to the configured AD servers using the specified service account and WMI.
> show user server-monitor statistics
Directory Servers:
Name TYPE Host Vsys Status
-----------------------------------------------------------------------------
pantacad2003.pantac.lab AD pantacad2003.pantac.lab vsys1 Connected
Confirm that the firewall is learning IP-to-user mappings from the monitored servers via the security event logs.
Use the CLI command:
> show user ip-user-mapping all
IP Vsys From User IdleTimeout(s) MaxTimeout(s)
--------------- ------- ------- ------------------------------- -------------- -------------
192.168.28.15 vsys1 AD pantac\tom 2576 2541
192.168.29.106 vsys1 AD pantac\userid 2660 2624
192.168.29.110 vsys1 AD pantac\userid 2675 2638
Total: 3 users
Ensure that User Identification is enabled on the network zones where the user traffic (whose identity you need to map) will originate.