User Credential Detection
- Objects > Security Profiles > URL Filtering > User Credential Detection
Enable the firewall to detect when users submit corporate credentials. The firewall uses one of three methods to detect valid credentials submitted to web pages. Each method requires User-ID™, which enables the firewall to compare username and password submissions to web pages against valid, corporate credentials. Select one of these methods to then continue to Prevent Credential Phishing based on URL category.
User Credential Detection Settings
This credential detection method checks for valid username submissions. You can use this method to detect credential submissions that include a valid corporate username (regardless of the accompanying password). The firewall determines a username match by verifying that the username matches the user logged in the source IP address of the session. To use this method, the firewall matches the submitted username against its IP-address-to-username mapping table. To use this method you can use any of the user mapping methods described in Map IP Addresses to Users.
The firewall determines if the username a user submits to a restricted site matches any valid corporate username. To do this, the firewall matches the submitted username to the list of usernames in its user-to-group mapping table to detect when users submit a corporate usernames to a site in a restricted category.
This method only checks for corporate username submissions based on LDAP group membership, which makes it simple to configure, but more prone to false positives. You must enable group mapping to use this method.
This credential detection method enables the firewall to check for a valid corporate username and the associated password. The firewall determines if the username and password a user submits matches the same user’s corporate username and password.
To do this, the firewall must able to match credential submissions to valid corporate usernames and passwords and verify that the username submitted maps to the IP address of the logged in user. This mode is supported only with the Windows-based User-ID agent, and requires that the User-ID agent is installed on a read-only domain controller (RODC) and equipped with the User-ID Credential Service Add-on. To use this method, you must also enable User-ID to Map IP Addresses to Users using any of the supported user mapping methods, including Authentication Policy and Captive Portal and GlobalProtect.™
See Prevent Credential Phishing for details on each of the methods the firewall can use to check for valid corporate credential submissions, and for steps to enable phishing prevention.
Valid Username Detected Log Severity
Set the severity for logs that indicate the firewall detected a valid username submission to a website.
This log severity is associated with events where a valid username is submitted to websites with credential submission permissions to alert, block or continue. Logs that record when a user submits a valid username to a website for which credential submissions are allowed have a severity of informational. Select
Categoriesto review or adjust the URL categories to which credential submissions are allowed and blocked.
Recommended For You
Recommended videos not found.