<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CheckPoint Identity Collector requires NTLM? Does not use Kerberos? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165660#M29731</link>
    <description>&lt;P&gt;Maybe&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;can confirm for you, but I dont see any options for Kerberos when I looked at my lab for IDC.&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2022 12:40:02 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2022-12-20T12:40:02Z</dc:date>
    <item>
      <title>CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165646#M29728</link>
      <description>&lt;P&gt;We have made good progress on depreciating all versions of NTLM in our environment. With us getting assistance from Microsoft premier support, from a non-public knowledge base article, we were able to migrate AD CS (Active Directory Certificate Services) over to Kerberos as well for automated certificate enrolment interactions.&lt;/P&gt;&lt;P&gt;CheckPoint identity awareness is now the last remaining item in our environment which appears to break when we disable NTLM completely. Surely CheckPoint, as a security focused vendor, have a method for gateways to retrieve the security event logs without relying on NTLM?&lt;/P&gt;&lt;P&gt;Group Policy (GPOs) are applied to members servers and workstations to disable NTLM:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gpo_ntlm_disabled_everywhere.png" style="width: 481px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18849iCC858E0CCA3A944C/image-size/large?v=v2&amp;amp;px=999" role="button" title="gpo_ntlm_disabled_everywhere.png" alt="gpo_ntlm_disabled_everywhere.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This then breaks CheckPoint Identity Collector, unless we apply the following policy just to the DCs (whilst continuing to apply the above policy to the dedicated Windows Server 2022 host running &lt;EM&gt;Check Point Identity Collector&lt;/EM&gt; v81.035.0000). The following GPO is exclusively applied to our Domain Controllers:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gpo_ntlm_enabled_only_on_DCs.png" style="width: 424px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18851i9A44A46976A9A74C/image-size/large?v=v2&amp;amp;px=999" role="button" title="gpo_ntlm_enabled_only_on_DCs.png" alt="gpo_ntlm_enabled_only_on_DCs.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this applied everything works perfectly:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fwcp_idcollect_status_ok.png" style="width: 894px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18850i6DBA70930AEADDD9/image-size/large?v=v2&amp;amp;px=999" role="button" title="fwcp_idcollect_status_ok.png" alt="fwcp_idcollect_status_ok.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wanted to reach out to the community before opening a case with TAC, we have Kerberos AES integration working between the gateways and the DCs, it's purely the Identity Awareness application which does not appear to provide support for Kerberos.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;My unenlightened understanding is that the DCOM call from the Identity Collector to the DC isn't using NTLM, otherwise it should have been blocked by the GPO blocking any and all NTLM. I thus presume the NTLM auth is within the LDAP TLS tunnels to the individual DCs then.&lt;/P&gt;&lt;P&gt;Problem currently is that the NTLM auth doesn't originate from anywhere, we can't even lock down NTLM by adding an exception via the 'Network security: Restrict NTLM: Add server exceptions in this domain' GPO.&lt;/P&gt;&lt;P&gt;Herewith a sample:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Calling process PID: 4&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Calling process name: &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Calling process LUID: 0x3E7&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Calling process user identity: REDACTEDDC01$&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Calling process domain identity: REDACTED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;Mechanism OID: 1.3.6.1.4.1.311.2.2.10&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;Audit NTLM authentication requests to this server that would be blocked if the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic is set to Deny all accounts or Deny all domain accounts.&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;If you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 15:36:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165646#M29728</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2022-12-20T15:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165649#M29729</link>
      <description>&lt;P&gt;No change in behaviour after upgrading to v81.040.0000 (released the 22nd of September 2022).&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 09:06:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165649#M29729</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2022-12-20T09:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165651#M29730</link>
      <description>&lt;P&gt;Did you involve TAC yet ?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 09:27:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165651#M29730</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-12-20T09:27:56Z</dc:date>
    </item>
    <item>
      <title>CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165660#M29731</link>
      <description>&lt;P&gt;Maybe&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;can confirm for you, but I dont see any options for Kerberos when I looked at my lab for IDC.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 12:40:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165660#M29731</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-12-20T12:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165673#M29733</link>
      <description>&lt;P&gt;There’s a couple of SKs that mention NTLM and Identity Collector:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177944&amp;amp;partition=Advanced&amp;amp;product=Identity" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177944&amp;amp;partition=Advanced&amp;amp;product=Identity&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177944&amp;amp;partition=Advanced&amp;amp;product=Identity" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177944&amp;amp;partition=Advanced&amp;amp;product=Identity&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As far as doing it without NTLM, I’ll have to defer to R&amp;amp;D if that’s currently possible or if it’s an RFE.&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 14:38:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/165673#M29733</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-20T14:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/168519#M30485</link>
      <description>&lt;P&gt;The frustration with this currently is that we have to leave NTLM enabled in the domain globally and can't simply define the system running the Identity Collector as an exception. I did however manage to find a way to export and filter the security events to get examples of the NTLM based authentication request that's occurring over the LDAPS (yes, TLS encrypted) connection:&lt;/P&gt;&lt;PRE&gt;   4624, DC03.redacted, 01/20/2023 10:35:55, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x2249854a 3 Kerberos Kerberos - {2e8bcb9a-5b4f-0d50-6ed1-20c55870b16a} - - 0 0x0 - 192.168.230.2 54584 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x2249806e 3 Kerberos Kerberos - {57c56588-a70a-0182-d2e7-9c7d41bdc4a5} - - 0 0x0 - 192.168.230.2 54580 %%1840 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22498040 3 Kerberos Kerberos - {57c56588-a70a-0182-d2e7-9c7d41bdc4a5} - - 0 0x0 - 192.168.230.2 54578 %%1840 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497f2f 3 Kerberos Kerberos - {57c56588-a70a-0182-d2e7-9c7d41bdc4a5} - - 0 0x0 - 192.168.230.2 54577 %%1840 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497f05 3 Kerberos Kerberos - {57c56588-a70a-0182-d2e7-9c7d41bdc4a5} - - 0 0x0 - 192.168.230.2 54574 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497e6e 3 Kerberos Kerberos - {57c56588-a70a-0182-d2e7-9c7d41bdc4a5} - - 0 0x0 - 192.168.230.2 49687 %%1840 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;4&amp;gt; 4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14289 checkpointidcollect DOMAIN-01 0x22497dd7 3 NtLmSsp NTLM FWCP-IDCOLLECT {00000000-0000-0000-0000-000000000000} - NTLM V2 128 0x0 - 192.168.230.2 54566 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;3&amp;gt; 4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14289 checkpointidcollect DOMAIN-01 0x22497da6 3 NtLmSsp NTLM FWCP-IDCOLLECT {00000000-0000-0000-0000-000000000000} - NTLM V2 128 0x0 - 192.168.230.2 49717 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;2&amp;gt; 4624, DC03.redacted, 01/20/2023 10:35:53, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497c58 3 Kerberos Kerberos - {4434cb5d-84fc-7e9e-aa6a-9e0323176c38} - - 0 0x0 - - - %%1840 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;1&amp;gt; 4624, DC03.redacted, 01/20/2023 10:35:52, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x2249761d 3 Kerberos Kerberos - {2e8bcb9a-5b4f-0d50-6ed1-20c55870b16a} - - 0 0x0 - 192.168.230.2 49701 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:51, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497603 3 Kerberos Kerberos - {2e8bcb9a-5b4f-0d50-6ed1-20c55870b16a} - - 0 0x0 - 192.168.230.2 49697 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:51, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x224975e2 3 Kerberos Kerberos - {2e8bcb9a-5b4f-0d50-6ed1-20c55870b16a} - - 0 0x0 - 192.168.230.2 49677 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:51, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x2249752a 3 Kerberos Kerberos - {d5bc5d2a-1314-a8cf-94c6-df1ee47d08a1} - - 0 0x0 - 192.168.230.2 49687 %%1840 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:51, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497368 3 Kerberos Kerberos - {2e8bcb9a-5b4f-0d50-6ed1-20c55870b16a} - - 0 0x0 - 192.168.230.2 49692 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;BR /&gt;   4624, DC03.redacted, 01/20/2023 10:35:50, S-1-0-0 - - 0x0 S-1-5-21-3939028960-2985278838-3069617384-14790 FWCP-IDCOLLECT$ REDACTED 0x22497344 3 Kerberos Kerberos - {2e8bcb9a-5b4f-0d50-6ed1-20c55870b16a} - - 0 0x0 - 192.168.230.2 49688 %%1833 - - - %%1843 0x0 %%1843,(System.Diagnostics.EventLogEntry.message)&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Kerberos requests appear to be from the system itself checking in to the DC after the VM was restarted. This VM runs nothing besides the Identity Collector. Events 3 &amp;amp; 4 are the ones that originate from the Identity Collector:&lt;/P&gt;&lt;P&gt;Events 4 &amp;amp; 3 generate the following event log entries in Microsoft-Windows-NTLM/Operational:&lt;BR /&gt;PS: Events 4 &amp;amp; 3 generate the exact same NTLM operational log entries so only one example is shown:&lt;/P&gt;&lt;PRE&gt;Source: NTLM&lt;BR /&gt;Logged: 2023/01/20 10:35:53&lt;BR /&gt;Event ID: 8002&lt;BR /&gt;Task Category: Auditing NTLM&lt;BR /&gt;Level: Information&lt;BR /&gt;User: SYSTEM&lt;BR /&gt;Computer: DC03.redacated&lt;BR /&gt;OpCode: Info&lt;BR /&gt;General Event Data:&lt;BR /&gt;NTLM server blocked audit: Audit Incoming NTLM Traffic that would be blocked&lt;BR /&gt;Calling process PID: 1388&lt;BR /&gt;Calling process name: C:\Windows\System32\svchost.exe&lt;BR /&gt;Calling process LUID: 0x3E5&lt;BR /&gt;Calling process user identity: LOCAL SERVICE&lt;BR /&gt;Calling process domain identity: NT AUTHORITY&lt;BR /&gt;Mechanism OID: (NULL)&lt;BR /&gt;&lt;BR /&gt;Audit NTLM authentication requests to this server that would be blocked if the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic is set to Deny all accounts or Deny all domain accounts.&lt;BR /&gt;&lt;BR /&gt;If you want this server to allow NTLM authentication, set the security policy Network Security: Restrict NTLM: Incoming NTLM Traffic to Allow all.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Events 3 &amp;amp; 4 are identical, herewith a single example&lt;/P&gt;&lt;PRE&gt;4&amp;gt;&lt;BR /&gt;An account was successfully logged on.&lt;BR /&gt;&lt;BR /&gt;Subject:&lt;BR /&gt;Security ID: NULL SID&lt;BR /&gt;Account Name: -&lt;BR /&gt;Account Domain: -&lt;BR /&gt;Logon ID: 0x0&lt;BR /&gt;&lt;BR /&gt;Logon Information:&lt;BR /&gt;Logon Type: 3&lt;BR /&gt;Restricted Admin Mode: -&lt;BR /&gt;Virtual Account: No&lt;BR /&gt;Elevated Token: No&lt;BR /&gt;&lt;BR /&gt;Impersonation Level: Impersonation&lt;BR /&gt;&lt;BR /&gt;New Logon:&lt;BR /&gt;Security ID: DOMAIN-01\checkpointidcollect&lt;BR /&gt;Account Name: checkpointidcollect&lt;BR /&gt;Account Domain: DOMAIN-01&lt;BR /&gt;Logon ID: 0x22497DD7&lt;BR /&gt;Linked Logon ID: 0x0&lt;BR /&gt;Network Account Name: -&lt;BR /&gt;Network Account Domain: -&lt;BR /&gt;Logon GUID: {00000000-0000-0000-0000-000000000000}&lt;BR /&gt;&lt;BR /&gt;Process Information:&lt;BR /&gt;Process ID: 0x0&lt;BR /&gt;Process Name: -&lt;BR /&gt;&lt;BR /&gt;Network Information:&lt;BR /&gt;Workstation Name: FWCP-IDCOLLECT&lt;BR /&gt;Source Network Address: 192.168.230.2&lt;BR /&gt;Source Port: 54566&lt;BR /&gt;&lt;BR /&gt;Detailed Authentication Information:&lt;BR /&gt;Logon Process: NtLmSsp &lt;BR /&gt;Authentication Package: NTLM&lt;BR /&gt;Transited Services: -&lt;BR /&gt;Package Name (NTLM only): NTLM V2&lt;BR /&gt;Key Length: 128&lt;BR /&gt;&lt;BR /&gt;This event is generated when a logon session is created. It is generated on the computer that was accessed.&lt;BR /&gt;&lt;BR /&gt;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;BR /&gt;&lt;BR /&gt;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&lt;BR /&gt;&lt;BR /&gt;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&lt;BR /&gt;&lt;BR /&gt;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;BR /&gt;&lt;BR /&gt;The impersonation level field indicates the extent to which a process in the logon session can impersonate.&lt;BR /&gt;&lt;BR /&gt;The authentication information fields provide detailed information about this specific logon request.&lt;BR /&gt;- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&lt;BR /&gt;- Transited services indicate which intermediate services have participated in this logon request.&lt;BR /&gt;- Package name indicates which sub-protocol was used among the NTLM protocols.&lt;BR /&gt;- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NB: Adding FWCP-IDCOLLECT to the&amp;nbsp;&lt;STRONG&gt;Network security: Restrict NTLM: Add server exceptions in this domain&lt;/STRONG&gt; does not allow the above to work. I presume this is due to NTLM happening within LDAPS so the NTLM authentication requests appears 'out of nowhere' and doesn't directly originate from the FWCP-IDCOLLECT system as such...&lt;BR /&gt;&lt;BR /&gt;PS: Still slogging through tier 1/2, hoping to get an answer from R&amp;amp;D whether or not this is on the road map already or requires a request for enhancement.&lt;BR /&gt;&lt;BR /&gt;Herewith the crux of the problem, defining the hostname of the dedicated Windows Server that is running the CheckPoint Identity Collector does not allow NTLM via the method the application is using. Creating exceptions for BYOD wireless network access controller (PacketFence) or other RADIUS systems work perfectly when we exempt the workstation name:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GPO_example.png" style="width: 784px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19225i4BBD3A4E7FAB3030/image-size/large?v=v2&amp;amp;px=999" role="button" title="GPO_example.png" alt="GPO_example.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 12:29:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/168519#M30485</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2023-01-20T12:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/180420#M32996</link>
      <description>&lt;P&gt;Having the same issue, did you get an official answer from TAC / R&amp;amp;D on this?&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 17:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/180420#M32996</guid>
      <dc:creator>bzc</dc:creator>
      <dc:date>2023-05-09T17:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/182571#M33474</link>
      <description>&lt;P&gt;Also having the same issue. curious as to what progress if any has been made.&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 16:31:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/182571#M33474</guid>
      <dc:creator>mr_bigglesworth</dc:creator>
      <dc:date>2023-05-30T16:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/182585#M33476</link>
      <description>&lt;P&gt;+1...I actually had TAC case on this for the customer and it went absolutely nowhere. They told me would contact R&amp;amp;D (no clue if task was even created, I doubt it, as one was never provided to begin with) and that was pretty much it.&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 17:44:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/182585#M33476</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-05-30T17:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/200874#M37737</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9832"&gt;@David_Herselman&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;BR /&gt;I believe with the new IDC version (R81.069.0000), support for Kerberos authentication was added.&amp;nbsp;&lt;/P&gt;&lt;P&gt;See&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk134312:" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk134312:&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;IDA-5593&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2023 11:30:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/200874#M37737</guid>
      <dc:creator>pini</dc:creator>
      <dc:date>2023-12-18T11:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/218751#M41769</link>
      <description>&lt;P&gt;You're right Pini, However it is not working by default and need the following setup :&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P data-unlink="true"&gt;To enable the Add Domain Controllers automatically by DNS and LDAP queries as well as the periodic AD discovery flows to function seamlessly with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;Kerberos&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;authentication, it is imperative that domain credentials be formatted in the User Principal Name (UPN) format. It is crucial to note that the use of a combination of User Principal Name format and DC IP address is not compatible.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 26 Jun 2024 07:47:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/218751#M41769</guid>
      <dc:creator>Greg40</dc:creator>
      <dc:date>2024-06-26T07:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint Identity Collector requires NTLM? Does not use Kerberos?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/218757#M41770</link>
      <description>&lt;P&gt;Good to know!&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 09:03:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-Identity-Collector-requires-NTLM-Does-not-use/m-p/218757#M41770</guid>
      <dc:creator>pini</dc:creator>
      <dc:date>2024-06-26T09:03:04Z</dc:date>
    </item>
  </channel>
</rss>

