<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness - AD Query: strange behaviour in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142807#M24186</link>
    <description>&lt;P&gt;I think thats your problem...uncheck 1st option and push policy and test.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 02 Mar 2022 15:04:46 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-03-02T15:04:46Z</dc:date>
    <item>
      <title>Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142786#M24183</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am currently investigating an issue one of our customers has wih AD-Query in Identity Awareness.&lt;BR /&gt;Initially the problem reported was occurences of "A secondary session request was received from the same IP. This caused logout of the current session", in combination with users complaining about access problems. They were getting the blockpage instead of access that should be allowed for this user or group. The customer suspects that these secondary session logouts are causing the problems.&lt;/P&gt;&lt;P&gt;After looking at the logs, I think the problem might be something else, but I can not make sense of it(yet). I am still fairly new to Check Point, so maybe I am missing something here.&lt;/P&gt;&lt;P&gt;Here is one example of events from the logs, where the problem occured last week:&lt;/P&gt;&lt;P&gt;08:01:12: machine authentication(AD Query)&lt;BR /&gt;connections from machine, no user yet: access denied&lt;BR /&gt;08:02:38: user authentication(AD Query)&lt;BR /&gt;connections: access allowed based on user/group rules, source username in logs&lt;BR /&gt;08:02:54: A secondary session request was received from the same IP. This caused logout of the current session(AD Query)&lt;BR /&gt;connections: access still allowed, seeing source user name in logs&lt;BR /&gt;08:14:28: Machine authentication(AD Query)&lt;BR /&gt;connections: access denied, no source user name listed, only machine as source&lt;BR /&gt;08:21:58: "A secondary session request was received..."(AD Query)&lt;BR /&gt;connections: access allowed again, source user name in logs&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;To me it seems the user does not get logged out in between. The secondary Session notification says it does cause a logout, but shouldn't I see another user login on the same time then, the one that caused this?&lt;BR /&gt;I am confused by this and I would really like to understand what exactly is happening here. Is there any way to find out what exactly does cause these secondary session events or why the access for the user is not working anymore after the machine logs back in?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The customer already tried looking up the events in the Domain Controller, but while seeing them there, there is also no info on what exactly caused them.&lt;/P&gt;&lt;P&gt;Also this is not happening very often and cannot be reproduced manually, which makes debugging this a bit harder. Any help on how to find this out would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 13:15:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142786#M24183</guid>
      <dc:creator>Kryten</dc:creator>
      <dc:date>2022-03-02T13:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142801#M24184</link>
      <description>&lt;P&gt;Hey Alex,&lt;/P&gt;
&lt;P&gt;Can you confirm below settings on IA tab of identity awareness on the firewall objects?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15568iAC288D10A2002C1D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 14:28:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142801#M24184</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-02T14:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142806#M24185</link>
      <description>&lt;P&gt;The first Option is checked, the second is not.&lt;/P&gt;&lt;P&gt;Are machine identities treated the same way as a user when it comes to sessions per IP? I would have thought that the first Option only applies to user identities, just as it says....&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 14:54:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142806#M24185</guid>
      <dc:creator>Kryten</dc:creator>
      <dc:date>2022-03-02T14:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142807#M24186</link>
      <description>&lt;P&gt;I think thats your problem...uncheck 1st option and push policy and test.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 15:04:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142807#M24186</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-02T15:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142819#M24187</link>
      <description>&lt;P&gt;I will have to discuss this with the customer, but I think there is porobably a reason why it is configured like that and we do not want to break other things too easily &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also I would like to understand what exactly is happening and why before I change things. As I said, there is only one user using that machine, so I would naturally think that this option would do no harm....so what is the problem here?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 15:55:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142819#M24187</guid>
      <dc:creator>Kryten</dc:creator>
      <dc:date>2022-03-02T15:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142827#M24188</link>
      <description>&lt;P&gt;Right, but...if you think about it logically, that setting says "assume that one user is connected per computer", meaning if 2nd person tried to connect to that same IP, it will not work.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 17:48:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142827#M24188</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-02T17:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142864#M24189</link>
      <description>&lt;P&gt;But there is no second person involved here...only one user and his personal computer.&lt;/P&gt;&lt;P&gt;I understand that other things than a user logging into his computer can cause additional login events, like opening a captive portal (in this case we see "Source: Captive Portal" so that is not the case for this user here) or login to fileshares. I just want to know if there is a way to find out what exactly caused these events.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 08:28:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142864#M24189</guid>
      <dc:creator>Kryten</dc:creator>
      <dc:date>2022-03-03T08:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142903#M24190</link>
      <description>&lt;P&gt;Sorry sorry, my bad, I did not realize it was just one user, apologies. So, you are saying just one user was attempting a connection and those logs came up? If so, I would involve TAC, because it makes no sense that log would say secondary session came from same IP. Is there identity agent involved here or no?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 13:14:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142903#M24190</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-03-03T13:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142997#M24191</link>
      <description>&lt;P&gt;Only AD-Query so far, we tried using the Identity Agent for one affected user but saw no difference. Its hard to tell though, as this happens pretty rarely.&lt;BR /&gt;I know of a few cases where a secondary session can happen, thus I would like to be able to somehow find out exactly the cause for these. I start to fear that this is not possible without monitoing the user and his computer closely, which is also not possible &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I guess a TAC Case it is then...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot so far!&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 15:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/142997#M24191</guid>
      <dc:creator>Kryten</dc:creator>
      <dc:date>2022-03-04T15:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/150081#M24192</link>
      <description>&lt;P&gt;Service account login on the same device? Exclude service accounts under advanced settings if so.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 04:30:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/150081#M24192</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2022-06-03T04:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD Query: strange behaviour</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/150154#M24227</link>
      <description>&lt;P&gt;Any chance the customer's Active Directory folks elevated&amp;nbsp;CVE-2021-26414 to enforce ahead of next months Microsoft patches?&amp;nbsp; Checkpoint released jumbo's this past month or so to address the issue.&amp;nbsp; &amp;nbsp;See&amp;nbsp;&lt;SPAN&gt;sk176148&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 14:51:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-Query-strange-behaviour/m-p/150154#M24227</guid>
      <dc:creator>George_Casper</dc:creator>
      <dc:date>2022-06-03T14:51:25Z</dc:date>
    </item>
  </channel>
</rss>

