<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identity Collector? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192175#M35496</link>
    <description>&lt;P&gt;Hello, I'm interested in where to install Identity Collector agent? I have a two AD Domain Controllers in my environment. One AD is active, second one is standby.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which one is the best practice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Install a two Identity Colletor agents on both AD Domain Controllers (active and passive)&lt;/P&gt;&lt;P&gt;2) Install one Identity Collector agent on some independent server (which is not AD Domain Controller)&lt;/P&gt;&lt;P&gt;3) Install a two Identity Colletor agents on some independent servers (which are not AD Domain Controllers)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which solution would you prefer?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Sep 2023 10:53:43 GMT</pubDate>
    <dc:creator>babicmilan</dc:creator>
    <dc:date>2023-09-11T10:53:43Z</dc:date>
    <item>
      <title>Identity Collector?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192175#M35496</link>
      <description>&lt;P&gt;Hello, I'm interested in where to install Identity Collector agent? I have a two AD Domain Controllers in my environment. One AD is active, second one is standby.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which one is the best practice?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Install a two Identity Colletor agents on both AD Domain Controllers (active and passive)&lt;/P&gt;&lt;P&gt;2) Install one Identity Collector agent on some independent server (which is not AD Domain Controller)&lt;/P&gt;&lt;P&gt;3) Install a two Identity Colletor agents on some independent servers (which are not AD Domain Controllers)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which solution would you prefer?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 10:53:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192175#M35496</guid>
      <dc:creator>babicmilan</dc:creator>
      <dc:date>2023-09-11T10:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192203#M35511</link>
      <description>&lt;P&gt;(3) is probably considered best practice by many, especially in environments with multiple DCs.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 12:27:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192203#M35511</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-09-11T12:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192207#M35513</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Option 3 is the one you should go for. This is what we always do when using Identity Awareness with Identity Collectors.&lt;BR /&gt;&lt;BR /&gt;In large companies, the AD administrators are not the same person as the network / firewall administrators. And those AD administrators are not very keen on letting other people accessing the Domain Controllers and installing 3rd party software on those servers.&lt;BR /&gt;&lt;BR /&gt;With independent servers (not domain joined) for the Identity Collector, firewall administrators can have complete control over the Identity Collector without the help of the AD administrator. This is very usefull when troubleshooting Identity Awareness issues.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And Domian Controllers have a specific task. Being Domain Controllers (maybe with the DNS and NTP services enabled). Installing 3rd party software on these vital servers is not something I would normally prefer.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 13:09:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192207#M35513</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2023-09-11T13:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192209#M35514</link>
      <description>&lt;P&gt;I can tell you having done all 3, they ALL work fine, BUT, as the guys said, option 3 is definitely most preferred.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 12:55:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192209#M35514</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-11T12:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192276#M35522</link>
      <description>&lt;P&gt;Our official documentation says to install on a separate system (not the AD controller).&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 17:54:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192276#M35522</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-11T17:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Collector?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192279#M35524</link>
      <description>&lt;P&gt;From:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/Identity_Awareness_Clients_Admin_Guide/Content/Topics/Identity-Collector-Requirements.htm?tocpath=Identity%20Collector%7C_____1" target="_blank"&gt;https://sc1.checkpoint.com/documents/Identity_Awareness_Clients_Admin_Guide/Content/Topics/Identity-Collector-Requirements.htm?tocpath=Identity%20Collector%7C_____1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;If you install&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_ida_collector variable"&gt;Identity Collector&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;directly on the Domain Controllers (DCs) (including Windows&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Endpoint_SandBlast.tp_eps_fwpol variable"&gt;Firewall&lt;/SPAN&gt;), make sure the Windows&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Endpoint_SandBlast.tp_eps_fwpol variable"&gt;Firewall&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;rules allow DNS, LDAP, and DCOM traffic from the computer on which&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_ida_collector variable"&gt;Identity Collector&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is installed.&lt;/P&gt;
&lt;P&gt;In Windows&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_Other.tp_fwcap variable"&gt;Firewall&lt;/SPAN&gt;, add this "Allow"&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="MCTextPopup MCTextPopupHotSpot MCTextPopupHotSpot_ #text MCTextPopup_Closed" role="button" href="https://sc1.checkpoint.com/documents/Identity_Awareness_Clients_Admin_Guide/Content/Topics/Identity-Collector-Requirements.htm?tocpath=Identity%20Collector%7C_____1#" data-mc-state="closed" data-aria-describedby="e296dc25-73da-4a87-82f2-92dba6deb203" target="_blank"&gt;rule&lt;/A&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="the_rock_0-1694455111123.gif" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22417iD1A0F27103269955/image-size/medium?v=v2&amp;amp;px=400" role="button" title="the_rock_0-1694455111123.gif" alt="the_rock_0-1694455111123.gif" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;:&lt;/P&gt;
&lt;P&gt;"&lt;CODE&gt;Remote Event Log Management&lt;/CODE&gt;" &amp;gt; "&lt;CODE&gt;Remote Event Log Management (RPC)&lt;/CODE&gt;"&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_ida_collector variable"&gt;Identity Collector&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;processes these Windows events:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Authentication events - 4624, 4768, 4769, 4770&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Group update events - 4728, 4729, 4732, 4733, 4756, 4757&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Group deletion events - 4730, 4734, 4758&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 11 Sep 2023 17:58:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Collector/m-p/192279#M35524</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-11T17:58:39Z</dc:date>
    </item>
  </channel>
</rss>

