<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Agent | Run App as admin in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102946#M10221</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The admins are elevating privileges when they install a new application, for example. It's not a full desktop login.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Nov 2020 08:40:48 GMT</pubDate>
    <dc:creator>Cesar_Santos</dc:creator>
    <dc:date>2020-11-23T08:40:48Z</dc:date>
    <item>
      <title>Identity Agent | Run App as admin</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102364#M10217</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;Let me share a quick question with you. So, what's the behaviour of the Identity Agent if a Domain Admin runs an Application as Administrator in a Windows session of a normal user? It will send an update to the Gateway with a new mapping of the IP and the user admin? In that case, the rules applied on the gateway will be far more distinct that if the user mapping remains with the normal user. Is there a way to exclude the Administrator user from the events of the Identity Agent logs and updates? I've searched the documentation, but I've found nothing about this. Can anyone share knowledge on this?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2020 17:16:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102364#M10217</guid>
      <dc:creator>Cesar_Santos</dc:creator>
      <dc:date>2020-11-17T17:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent | Run App as admin</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102669#M10218</link>
      <description>&lt;P&gt;Hi Cesar,&lt;/P&gt;
&lt;P&gt;Are you asking about the Identity Agent or the Terminal Service (AKA MUH Agent)?&lt;/P&gt;
&lt;P&gt;In Identity Agent, a user must authenticate with Username/Password or via Kerberos ticket. Even if the&amp;nbsp;&lt;SPAN&gt;Administrator will run an app in a Windows session of a normal user, no update will be sent to the Security Gateway,&amp;nbsp;because the authentication was done with the normal user credentials.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please let me know if you have additional questions,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Elad Shoval &lt;/STRONG&gt;| Team Leader, Identity Awareness, Identity Clients, R&amp;amp;D&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 14:46:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102669#M10218</guid>
      <dc:creator>Elad_Shoval</dc:creator>
      <dc:date>2020-11-19T14:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent | Run App as admin</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102677#M10219</link>
      <description>&lt;P&gt;Hi Elad,&lt;/P&gt;&lt;P&gt;This is about the Identity Agent, not the MUH.&lt;/P&gt;&lt;P&gt;Are you sure that if I run an application in windows as administrator, the Identity Agent will just ignore that? Because we have a customer exactly wit this problem. So, basically the the end users are working properly, with the correct rules being applied, all normal. But, if a guy of the IT team run a software as administrator and uses his admin credentials, the Identity Agent running on background will pass a new IP/user mapping to the Gateway and the applied rules will be totally different. The only workaround that we know that works is to logoff and then logon again on the windows machine, which is not practical for our end users.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestion,&lt;/P&gt;&lt;P&gt;César Santos&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 15:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102677#M10219</guid>
      <dc:creator>Cesar_Santos</dc:creator>
      <dc:date>2020-11-19T15:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent | Run App as admin</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102858#M10220</link>
      <description>&lt;P&gt;Are the admins elevating privileges when they run, say, the installer or are they doing a full desktop login to the same system?&lt;/P&gt;</description>
      <pubDate>Sun, 22 Nov 2020 01:36:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102858#M10220</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-22T01:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent | Run App as admin</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102946#M10221</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The admins are elevating privileges when they install a new application, for example. It's not a full desktop login.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 08:40:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Run-App-as-admin/m-p/102946#M10221</guid>
      <dc:creator>Cesar_Santos</dc:creator>
      <dc:date>2020-11-23T08:40:48Z</dc:date>
    </item>
  </channel>
</rss>

