<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness &amp;gt; AD Query EOL Q2/2022 &amp;gt; Switch to ID Collector NOW! in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142571#M22835</link>
    <description>&lt;P&gt;With R81 the current recommended version it would be reasonable to expect that issues with AD Query would be fixed in that first. While it's reasonable to expect customers to upgrade (e.g. from R80.40) to the recommended version for a new fix, expecting them to upgrade to a version that is not the recommended release isn't.&lt;/P&gt;</description>
    <pubDate>Sun, 27 Feb 2022 22:23:35 GMT</pubDate>
    <dc:creator>Paul_Hagyard</dc:creator>
    <dc:date>2022-02-27T22:23:35Z</dc:date>
    <item>
      <title>Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141483#M22819</link>
      <description>&lt;DIV class=""&gt;
&lt;P&gt;&lt;SPAN&gt;Microsoft further hardens Windows and enforces it's DCOM security feature in &lt;A href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_self"&gt;response to&amp;nbsp;CVE-2021-26414&lt;/A&gt;. On June 14, 2022, Microsoft will go into the second stage of hardering DCOM, and the mentioned change may interfere with your current AD Query implementation. More details about this can be found in&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176148" target="_self"&gt;sk176148&lt;/A&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;While Check Point R&amp;amp;D is apparently working to overcome this issue, now it is a good time to consider moving from AD Query to Identity Collector implementation.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;This has been discussed &lt;A href="https://community.checkpoint.com/t5/General-Topics/AD-query-failed-with-Microsoft-Windows-Server-2022/m-p/134624/highlight/true#M24118" target="_self"&gt;before&lt;/A&gt;. I'll focus on Check Point Best Practices and Solutions.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;(PDF) &lt;STRONG&gt;&lt;A href="https://www.checkpoint.com/downloads/products/cp-identity-awareness-reference-architecture-best-practices.pdf" target="_self"&gt;Identity Awareness: Reference Architecture &amp;amp; Best Practices&lt;/A&gt;&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;recommends ID Collector&lt;/STRONG&gt; because of &lt;STRONG&gt;security&lt;/STRONG&gt; (&lt;EM&gt;requires low privileged account only, while AD query requires a high privileged account&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;recommends ID Collector&lt;/STRONG&gt; because it's &lt;STRONG&gt;better suited&lt;/STRONG&gt; for low, medium and large scale deployments (&lt;EM&gt;the use case for AD query is small deployments only&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;recommends ID Collector&lt;/STRONG&gt; because it's &lt;STRONG&gt;low resource use&lt;/STRONG&gt;&amp;nbsp;(&lt;EM&gt;AD query has high resource use&lt;/EM&gt;)&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;recommends ID Collector&lt;/STRONG&gt; because it's &lt;STRONG&gt;realtime identity assurance&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;recommends ID Collector&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;for&lt;/STRONG&gt; company's &lt;STRONG&gt;headquarters&lt;/STRONG&gt; together with a dedicated PDP enabled firewall that shares to a PEP enabled perimeter firewall&amp;nbsp; (&lt;EM&gt;reminder: AD query is only recommended for small deployments, so it's not intended for headquarters&lt;/EM&gt;)&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;Reference architecture for external perimeter (&lt;A href="https://www.checkpoint.com/downloads/products/cp-identity-awareness-pdp-broker-getting-started.pdf" target="_self"&gt;PDP Broker &amp;gt; Getting Started&lt;/A&gt;)&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 635px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15397i3AB9E94EA69BCA80/image-dimensions/635x273?v=v2" width="635" height="273" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Reference architecture for external perimeter using Maestro (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk175587" target="_self"&gt;Design Guideline&lt;/A&gt;)&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 729px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15398iE41979274C2637DA/image-dimensions/729x295?v=v2" width="729" height="295" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;(sk108235) &lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108235" target="_self"&gt;ID Collector - Technical Overview&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;(Admin Guide)
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Sources-Identity-Collector.htm" target="_self"&gt;ID Collector&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Configuring-Identity-Collector-Work-with-Active-Directory.htm" target="_self"&gt;Configuration&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Configuring-Identity-Collector-Installing-Identity-Collector.htm" target="_self"&gt;Installation&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Configuring-Identity-Collector-Optimization.htm" target="_self"&gt;Optimization&lt;/A&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;(sk176148) &lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176148" target="_self"&gt;Check Point response to CVE-2021-26414&lt;/A&gt;&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;recommends &lt;/STRONG&gt;&lt;STRONG&gt;Identity Collector&lt;/STRONG&gt; as the identity source instead of AD Query.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Ready to go?&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;verify your current AD Query configuration
&lt;UL&gt;
&lt;LI&gt;Tools: SmartConsole&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;verify the types and numbers of identities in your network
&lt;UL&gt;
&lt;LI&gt;Tools: SmartConsole, cpview, SmartEvent&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;verify where to install the ID Collector
&lt;UL&gt;
&lt;LI&gt;dedicated Windows server or directly on your AD&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;verify the required redundancy, create multiple ID Collectors&lt;/LI&gt;
&lt;LI&gt;verify if a PDP enabled firewall gateway (cluster) is required (headquarters!)
&lt;UL&gt;
&lt;LI&gt;don't worry, you don't need to buy new CP appliances, just create a pair of vHosts within your VMware ESXi infrastructure and buy&amp;nbsp;4x 1 CloudGuard Network virtual core for VMware ESXi (&lt;EM&gt;2x vCores * 2x vHost&lt;/EM&gt;)&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 320px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15399i3E2E4D8F397E5729/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Reminder:&lt;/STRONG&gt;&amp;nbsp;Identity Collector and AD Query should not be used together as they collect from the same identity source.&amp;nbsp;AD Query and Identity Collector conflict and should not&amp;nbsp;be used as the identity connector for the same gateway. Events may arrive out of sync and the same event may be observed&amp;nbsp;multiple times, leading to unpredictable results.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 15 Feb 2022 12:37:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141483#M22819</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2022-02-15T12:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141486#M22820</link>
      <description>&lt;P&gt;Thank you for the reminder! We're already thinking about switching to the ID collector architecture since months.&lt;BR /&gt;Atm we use AD Query on all of our sites. Some are smaller (10-200 users), some are bigger (200-2000 users) and most of them have a local DC.&lt;BR /&gt;According your post only solution is now to install ID collector on each site - bigger/more important sites will become a redundancy IDCollector. Question for me here - is it a good option to also roll out the identity agent? We never used it before but sometimes have issues when users very quickly change their work space. Any recommendations for this?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 22:03:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141486#M22820</guid>
      <dc:creator>D_W</dc:creator>
      <dc:date>2022-02-14T22:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141489#M22821</link>
      <description>&lt;P&gt;Nice.. a feature we bought into “ad query” is eol.. but we can buy a VMware core license if we need psp &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 22:42:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141489#M22821</guid>
      <dc:creator>skandshus</dc:creator>
      <dc:date>2022-02-14T22:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141495#M22822</link>
      <description>&lt;P&gt;thanks for the information! What options does Check Point recommend for Quantum Spark (Gaia Embedded) that do not require purchasing additional licenses??&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 00:23:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141495#M22822</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2022-02-15T00:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141497#M22823</link>
      <description>&lt;P&gt;This ("Quantum Spark" working with Identity Collector) should be address with the upcoming R81.X alignment, stay tuned for the EA (or enquire with your local SE).&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 01:34:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141497#M22823</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-02-15T01:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141549#M22824</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Some more background:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;latest security needs have driven Microsoft to harden the WMI protocol used by AD Query&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;I strongly encourage reading carefully the &lt;A title="Microsoft article" href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank" rel="noopener"&gt;KB5004442&lt;/A&gt; and &lt;A title="Check Point Support SecureKnowledge" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176148" target="_blank" rel="noopener"&gt;sk176148&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;ID Collector only requires an &lt;STRONG&gt;Active Directory user account with Event Log Reader&lt;/STRONG&gt; rights (see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108235" target="_blank" rel="noopener"&gt;sk108235&lt;/A&gt;)&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;AD Query (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk60301&amp;amp;partition=Basic&amp;amp;product=Identity" target="_blank" rel="noopener"&gt;sk60301&lt;/A&gt;) requires Domain Administrator privileges (see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93938" target="_blank" rel="noopener"&gt;sk93983&lt;/A&gt; for using a non-domain admin account)&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These are the most important reasons w&lt;STRONG&gt;hy now is a good time to move from AD Query to Identity Collector&lt;/STRONG&gt;. In addition Check Point introduced &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Conciliation.htm?Highlight=concilation" target="_blank" rel="noopener"&gt;Identity Conciliation&lt;/A&gt;&amp;nbsp;(&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk146835&amp;amp;partition=Basic&amp;amp;product=Identity" target="_blank" rel="noopener"&gt;sk146835&lt;/A&gt;)&amp;nbsp;since R80.40.&amp;nbsp;Customers should upgrade to the recommended software release and GA Jumbo HF (see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95746&amp;amp;partition=Basic&amp;amp;product=Other%22" target="_self"&gt;sk95746&lt;/A&gt; for details) in order to benefit from &lt;STRONG&gt;Identity Conciliation allowing the PDP and PEP processes making a precise decision how to handle login events learned from different identity sources that are related to the same IP address&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the context of a migration project customers should review Identity Session Sharing (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk149255&amp;amp;partition=Advanced&amp;amp;product=Identity" target="_blank" rel="noopener"&gt;sk149255&lt;/A&gt;) and plan the project in details.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check Point Partners may want to review background about Identity Awareness documented in &lt;A href="https://community.checkpoint.com/t5/Partner-Community/Enforcing-Security-Based-on-Identities-Slides-Video-and-Q-amp-A/m-p/93941#M281" target="_blank" rel="noopener"&gt;this CheckMates webinar&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 13:31:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/141549#M22824</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-02-15T13:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142429#M22825</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/177"&gt;@Peter_Elmer&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;in you presentation from the CheckMates webinar you say that "&lt;STRONG&gt;All Logon Servers inside a fully trusted domain are sharing login events&lt;/STRONG&gt;". Is this really true? I discussed this with our AD experts and they don`t share this opinion (in terms of event logs). Could you please give us more details on how to understand this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;My other question is regarding&amp;nbsp;&lt;SPAN&gt;DCOM security feature and the Identity Collector communication with DC. What is the difference in communication (and event log reading) between AD query and Identity Collector. As mention in the documentation, both methods use DCOM/RPC and read event logs (security logs) from the DC. How comes that AD query is affected by the DCOM hardening and Identity collector is not?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And my last question is - why is the Identity session conciliation mechanism kind of a "secret" &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;? From the&amp;nbsp;&lt;A title="sk146835" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk146835&amp;amp;partition=Basic&amp;amp;product=Identity" target="_self"&gt;sk146835&lt;/A&gt;&amp;nbsp;and the IDA documentation we know, that there is a &lt;STRONG&gt;Confidence&lt;/STRONG&gt;, but it is not clear what confidence has which identity source. There are few examples in the SK which are totally insufficient to understand this correctly. As an example -&amp;gt; Kerberos vs Identity collector. Which has higher confidence?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Juraj&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 16:20:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142429#M22825</guid>
      <dc:creator>JuPo</dc:creator>
      <dc:date>2022-02-24T16:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142431#M22826</link>
      <description>&lt;P&gt;You can ignore my second question.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AD query uses &lt;STRONG&gt;WMI.&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Identity collector uses&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;Windows Event Log API&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Thu, 24 Feb 2022 16:35:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142431#M22826</guid>
      <dc:creator>JuPo</dc:creator>
      <dc:date>2022-02-24T16:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142439#M22827</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3323"&gt;@JuPo&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;thanks for your feedback.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prior to creating the material in 2019 I worked with several large enterprise customers investigating their IDA integration. I interviewed AD admin teams and back then, it was a consistent pattern that AD Servers have been configured to share login events inside trusted AD domain structures. I consulted with R&amp;amp;D and created the ppt material.&lt;/P&gt;
&lt;P&gt;Certainly this may be different today and different in your environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Back then it was a common issue, that multiple gateways learned login events twice (or more often):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;from AD servers using the PDP process configured to learn login events from a 'close by' AD Server&lt;/LI&gt;
&lt;LI&gt;via ID Sharing form PDP to PEP (back then ID sharing was enabled by default)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;In detail:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Back then I observed AD servers shared login events among themselves and PDP instances learning login events from an AD Server 'close by'. Once a login event is learned by the PDP instance it generates an ID Session.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Back then, each gateway was most often configured for PDP and PEP. When PDP and PEP are running on the same gateways, each ID Session is immediately propagated to the PEP instance. The PEP instance enforces the security based on the ID Session. ID Session can - and should be - shared with PEP instances running on other (remote) gateways. The PDP work is 'kind of heavy lifting' and you want to 'save resources where you can'. Hence an ID Session sharing architecture is key to the success of any identity based network (see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk170765&amp;amp;srcFavorites=favorites" target="_blank" rel="noopener"&gt;sk170756&lt;/A&gt; and &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk175587" target="_blank" rel="noopener"&gt;sk175587&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's say for example gw1 has learned a login event from a 'close by AD Server.&amp;nbsp; Gw1 is configured to share ID sessions with gw2. PEPgw2 learns a login event from PDPgw1 via ID Sharing but on the same gw2 a PDP is running and this PDP process learns the same login event from a 'close by' AD server: the same event is learned twice. Back then, there was not ID Conciliation functionality to control this sequence of events and as a result the gateway PEP instances was instructed from multiple PDP instances to add/remove/add ID sessions for the same login event.&lt;/P&gt;
&lt;P&gt;Back in the days prior creating the ppt you are referring too, I observed time delays of the login event propagation. I observed with AD Query latency: I observed the AD server is 'quicker' writing the Event log message and publishing it via Microsoft API 'event log' than publishing it via WMI infrastructure that is using the IIS web instance. I observed it takes 'more time' for a PDP to learn 'alice has logged on' using AD Query than using ID Collector.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ID Session Conciliation functionality is documented to introduce 'now the gateway can handle multiple login events coming from multiple sources related to the same IP address'. This wasn't possible before release R80.40.&amp;nbsp;The default capabilities are shaped after consulting with many customers and investigating many different scenarios.&lt;/P&gt;
&lt;P&gt;The ID Session Conciliation allows PDP and PEP instances managing multiple login events from multiple sources related to the same source IP Address.&amp;nbsp; You can use the &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_IdentityAwareness_AdminGuide/Topics-IDAG/CLI/pdp-conciliation.htm?TocPath=Command%20Line%20Reference%7Cpdp%7C_____4" target="_blank" rel="noopener"&gt;pdp conciliation command&lt;/A&gt; to modify it. In case your scenario is not achieved by the current settings you consult with Check Point support as indicated in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk146835&amp;amp;partition=Basic&amp;amp;product=Identity" target="_blank" rel="noopener"&gt;sk146835&lt;/A&gt; in order to have your gateways configured to achieve what you need.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am myself not changing the defaults - other then by the CLI commands. I respect TAC and R&amp;amp;D guiding relevant configuration changes. They are complex and each scenario should be consulted with TAC.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certainly I am happy to learn details about your environment and you can organize a meeting to discuss contacting your local Check Point contact. My calendar is open to all colleagues and they know, they can book a meeting according free slots.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;best regards&lt;/P&gt;
&lt;P&gt;pelmer&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 18:56:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142439#M22827</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-02-24T18:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142457#M22828</link>
      <description>&lt;P&gt;The R81.20 EA announcement (&lt;A href="https://community.checkpoint.com/t5/Product-Announcements/R81-20-EA-Program-Production/ba-p/135926" target="_blank"&gt;https://community.checkpoint.com/t5/Product-Announcements/R81-20-EA-Program-Production/ba-p/135926&lt;/A&gt;) says "Identity Collector is now supported with Quantum Spark Appliances." but provides no further clarification. Can the new R81.20-aligned Identity Collector agent be used with older management and gateway versions (R80.40/R81)? What SMB devices will be supported? We have many customers with SMB boxes that only support R77.20.x, not R80.20.x.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 20:36:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142457#M22828</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2022-02-24T20:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142463#M22829</link>
      <description>&lt;P&gt;I am still totally confused. And checkpoint guide/sk does not help much.. I’m seeing the DCOM issue on my server 2022.. how am I supposed to authenticate my remote access users (vpn) with their ad credentials? Can anybody share some insights and maybe a print screen on an example of a policy allowing this?? I got identity collector working.. picking up info from active directory and sending to gateway.. but I am REALLY confused on how this is supposed to work if I remove the ldap/ad query from the gateway, because that Will result in having 0 options in adsing users ti my access role, because I ain’t have a “directory” to search for users in smart console..&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 21:31:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142463#M22829</guid>
      <dc:creator>skandshus</dc:creator>
      <dc:date>2022-02-24T21:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142467#M22830</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1987"&gt;@Paul_Hagyard&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will forward your question to the relevant R&amp;amp;D team.&lt;/P&gt;
&lt;P&gt;greetings&lt;/P&gt;
&lt;P&gt;pelmer&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 07:54:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142467#M22830</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-02-25T07:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142469#M22831</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/61227"&gt;@skandshus&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;you may want to call your local Check Point contact in order to get direct help on your project. Here some indications:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Follow instructions given by Microsoft &lt;A href="https://support.microsoft.com/en-us/topic/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c" target="_blank"&gt;here&lt;/A&gt;. Note the time allowing customer using the less secure method of DCOM has been moved to 1&lt;STRONG&gt;4-March-2023&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Monitor &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176148" target="_blank"&gt;sk176148&lt;/A&gt; to get informed about the progress Check Point R&amp;amp;D documents for creating a solution allowing AD Query to support the more secure of DCOM&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Now about remote access users authenticating and authorizing against an on-premises Active Directory&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create a diagram allowing you to see the communication path and all network components securing the traffic from VPN Client computer towards application. It is imperative identifying all components 'along the way authentication traffic uses' in order to troubleshoot the environment.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Review &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/User-and-Client-Authentication.htm?TocPath=User%20and%20Client%20Authentication%20for%20Remote%20Access%7C_____4#Defining_User_and_Authentication_Methods_in_LDAP" target="_blank"&gt;Remote Access Guide&lt;/A&gt; and &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/LDAP-and-User-Directory.htm?TocPath=Managing%20User%20and%20Administrator%20Accounts%7CManaging%20User%20Accounts%7C_____6" target="_blank"&gt;Management Admin Guide&lt;/A&gt; sections about LDAP integration&lt;/LI&gt;
&lt;LI&gt;I created s&lt;A href="https://youtube.com/playlist?list=PLBfjYlNj4w1vJJBCdwJCAta4kvxI0t0Fb%20" target="_blank"&gt;tep-by-step videos for SAML based authentication for VPN Clients&lt;/A&gt; (sorry, I haven't videos for on-prem AD) but you can see the configuration of an authentication realm.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;The authentication realm is holding the descriptions of the systems (AD Servers) representing the authentication and authorization infrastructure - you don't remove any LDAP related configuration from the gateway!!&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;You add ID Collector to the gateway allowing it to learn the login event of the user towards the AD server. This event an only occur if the VPN client has established connectivity&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;I acknowledge that this is complex and encourage you to work with a local Check Point representative on this project.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-pelmer&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 08:44:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142469#M22831</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-02-25T08:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142470#M22832</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have migrated to Identity Collector to retrieve IPs/Users associations. It works correctly.&lt;BR /&gt;However, it seems that other features use the DCOM interface of the DCs:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;LDAP Account Unit&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;CRL retrieval&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;User Management&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Active Directory Query (migrated to IDC)&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is used to identify VPN users and rules based on Access Role.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What can be done?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 09:14:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142470#M22832</guid>
      <dc:creator>FGA_Sys_And_Net</dc:creator>
      <dc:date>2022-02-25T09:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142560#M22833</link>
      <description>&lt;P&gt;Since Management Server R81.20, the ID Collector can be configured for (centrally managed) 1500/1600/1800 GWs. It is supposed on those GWs since R80.20.35.&lt;/P&gt;
&lt;P&gt;As for a fix for AD Query which will support the new "Hardened" mode, we are working to add a fix into&amp;nbsp;R81.10, R80.20.35 and R77.20.87 releases over the coming weeks.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Feb 2022 07:49:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142560#M22833</guid>
      <dc:creator>AviG</dc:creator>
      <dc:date>2022-02-27T07:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142570#M22834</link>
      <description>&lt;P&gt;The DCOM security hardening will affect AD Query because it uses WMI to collect events from the Windows security event log. VPN RAS authentication will use whatever authentication mechanism is specified for the gateway (e.g. RADIUS, LDAP etc). I'm not aware of DCOM hardening in any way affecting LDAP. Alternately, if you have an Azure AD deployment you can use SAML integration and achieve MFA.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Feb 2022 22:20:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142570#M22834</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2022-02-27T22:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness &gt; AD Query EOL Q2/2022 &gt; Switch to ID Collector NOW!</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142571#M22835</link>
      <description>&lt;P&gt;With R81 the current recommended version it would be reasonable to expect that issues with AD Query would be fixed in that first. While it's reasonable to expect customers to upgrade (e.g. from R80.40) to the recommended version for a new fix, expecting them to upgrade to a version that is not the recommended release isn't.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Feb 2022 22:23:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142571#M22835</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2022-02-27T22:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142728#M22836</link>
      <description>&lt;P&gt;CORRECT!&lt;BR /&gt;I also see the DCOM error when using LDAP Integration for authenticating users on the remote access blade using their active directory identity.. so thats a "no go" apparantly..&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 21:56:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/142728#M22836</guid>
      <dc:creator>skandshus</dc:creator>
      <dc:date>2022-03-01T21:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/144741#M22837</link>
      <description>&lt;P&gt;Whats the workaround for bridge mode only deployments?&amp;nbsp; (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101371&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101371&amp;amp;partition=Advanced&amp;amp;product=Quantum&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;Seems like AD query is the only supported method today.&amp;nbsp; &amp;nbsp; &amp;nbsp;Anyone know if IA collector or any other methods are possible today or in near future releases?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2022 22:53:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/144741#M22837</guid>
      <dc:creator>Scottc98</dc:creator>
      <dc:date>2022-03-24T22:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: Move from Identity Awareness AD Query to ID Collector now</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/144798#M22838</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28302"&gt;@Scottc98&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;note that &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176148" target="_blank" rel="noopener"&gt;sk176148&lt;/A&gt; was updated to reflect the new dates given by Microsoft. In addition Hotfixes for R81 and R80.20 have been released allowing to continue the use of AD Query even with the Microsoft hardening activated. HFs for other releases are work in progress as documented in the sk.&lt;/P&gt;
&lt;P&gt;For your customers environment you may want to contact your local Check Point Sales Engineering reference and look at the overall design to explore options.&lt;/P&gt;
&lt;P&gt;best regards&lt;/P&gt;
&lt;P&gt;pelmer&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 14:40:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Move-from-Identity-Awareness-AD-Query-to-ID-Collector-now/m-p/144798#M22838</guid>
      <dc:creator>Peter_Elmer</dc:creator>
      <dc:date>2022-03-25T14:40:56Z</dc:date>
    </item>
  </channel>
</rss>

