Configure User-ID for Prisma Access Using the PAN-OS Integrated User-ID Agent
Table of Contents
Expand All
|
Collapse All
Prisma Access Docs
-
-
- Prisma Access China
- 4.0 & Later
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
-
-
-
- 5.2 Preferred and Innovation
- 5.1 Preferred and Innovation
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
Configure User-ID for Prisma Access Using the PAN-OS Integrated User-ID Agent
The following procedure shows how to configure
the PAN-OS integrated User-ID agent on the firewall for IP address-to-username
mapping. The integrated User-ID agent performs the same tasks as
the Windows-based agent with the exception of NetBIOS client probing.
While we support WMI probing, we do not recommend it.
- Create the User-ID service account in the Windows Active Directory (AD) server that is being used by the authentication server.Be sure that the user you create is part of the following groups:
- Distributed COM Users
- Event Log Readers
- Server Operators
We recommend only making these group associations. You do not have to configure Domain Admin or Enterprise Admin privileges for the User-ID service account to work correctly. Giving privileges to the account that aren’t required can give your network a larger attack surface.Configure Windows Management Instrumentation (WMI) on the AD server.The device uses WMI Authentication and you must modify the CIMV2 security properties on the AD server that connects to the device.- Open a command prompt window and run the wmimgmt.msc command.In the WMI Control pane, right-click WMI Control, choose Properties, and select the Security tab.Make the following changes in the CIMV2 folder:
- Select the CIMV2 folder.Click Security.Click AddSelect the service account you created in Step 1.This example uses the UserID user with the email of userid@example.com.Check Allow for the Enable Account and Remote Enable for the account you created.Click Apply.Click OK.In Panorama, select DeviceUser IdentificationUser Mapping and click the gear icon to edit the settings.Be sure that you have selected the Remote_Network_Template at the top of the page.Configure the Windows Remote Management (WinRM) protocol to monitor your Active Directory server.See the WinRM documentation in the PAN-OS Administrator’s Guide for details.