<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Agent - Auto Detecting gateway in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26438#M89166</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am more than happy to help. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you are 100% spot on with the find. I have just tested this in a vanilla setup in a virtual machine running Windows 10. Secure boot enabled the agent is not able to collect identities. With Secure Boot disabled the agent works flawlessly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Long term I think it would be beneficial to raise the RFE so that this is a supported feature in future releases of the agent. In the meantime, as a workaround for this specific scenario could you do the following?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Configure the captive portal on the gateway&lt;OL&gt;&lt;LI&gt;Kerberos SSO as well&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Create an AD group for the users/machines that use quick switching.&lt;/LI&gt;&lt;LI&gt;Create a group policy that will start IE and browse the captive portal where SSO will be performed and target the group you just created. Group policy will also need to contain the certificate of the captive portal so that the machines trust it and don't display a certificate error page.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the SSO within the captive portal has completed your identity based rules should apply as normal. I believe that this may be a viable workaround?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Jan 2019 20:24:46 GMT</pubDate>
    <dc:creator>Mark_Mitchell</dc:creator>
    <dc:date>2019-01-30T20:24:46Z</dc:date>
    <item>
      <title>Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26414#M89142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For some reason within the Identity Agent, when I auto detect the gateway to connect to, the correct IP address shows, but does not connect. If I edit this to the hostname, it does connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure why this is occurring, but what have others done for setting this up. I'm working towards deploying the agent, but want to make sure it's as seamless as possible for my users. I'd rather get to the root of this than bundle a custom MSI that includes our host name in the field already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone see this situation before?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 15:53:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26414#M89142</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-22T15:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26415#M89143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say it connects if you edit the hostname, do you mean that it works when you manually specify the Gateway? or that you manipulated the host file on the machine to make it connect?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 16:21:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26415#M89143</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2019-01-22T16:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26416#M89144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I mean that I manually specify the gateway in the agents settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I need to have the correct _tcp DNS record setup to get this working, however i'm having trouble creating the record, as CHECKPOINT_NAC_SERVER isn't accepted as a service.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 16:30:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26416#M89144</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-22T16:30:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26417#M89145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you will need that service record to exist for the auto-discovery to complete. I asked our AD admin to set up this record for me, so I don't know if there was some trick to getting it to work. But, he didn't come back to me saying he had issues creating it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm assuming you are doing this in Windows DNS? Do you already have an A record for the GW defined? Were you using the FQDN for the Gateway in the "Host offering this service" field?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 16:42:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26417#M89145</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2019-01-22T16:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26418#M89146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yup we are on windows DNS. the "Host offering this service" I put in the FQDN of the gateway.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;whenever I choose the _https protocol, it creates a new subdomain in _tcp, which I don't think should be happening, it should just be the protocol for the srv record, not another subdomain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 16:53:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26418#M89146</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-22T16:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26419#M89147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are setting the protocol to "_https"? I think the protocol is supposed to be "_tcp" and just the port number specified as 443. At least, that's how the IA Admin Guide shows it:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/77169_ia_dns.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe that's your issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 16:58:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26419#M89147</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2019-01-22T16:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26420#M89148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah yea, thats what I had wrong. I was doing _https instead of _tcp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can create the entry now, however I'm realizing i have a problem with auto connecting still. My gateway is in the main domain, and the computers are in a subdomain, however the subdomain is defined as a separate domain. Our DNS is a little messy. Any idea on getting around this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 17:06:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26420#M89148</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-22T17:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26421#M89149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which domain did you put this SRV record in? I think it should work if you create an A record in the "computers subdomain" that points to the IP of the Gateway running IA. It shouldn't matter that the Gateway's DNS registers in a different domain as long as the desktops can route to the IP of the Gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that A record in place, put the SRV record in the computers subdomain and point it at the FQDN computers domain&amp;nbsp;hostname you just created for the GW. This way, the computers should be able to find this SRV record and resolve DNS to the Gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if that got a little word-y! It made sense in my head, hopefully I translated the idea clear enough &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 17:15:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26421#M89149</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2019-01-22T17:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26422#M89150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You got the idea through, no worries!&lt;/P&gt;&lt;P&gt;I deleted the srv record from the base domain, and created it in the subdomain instead, using the original FQDN for the "host offering this service", which resolved to the correct domain. No need to create pointers or additional records.&lt;/P&gt;&lt;P&gt;My test client then connected immediately&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 17:45:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26422#M89150</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-22T17:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26423#M89151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cool! Glad that all worked out!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your OP, you said you wanted it to be as seamless as possible for the users. From my experience, your users&amp;nbsp;may&amp;nbsp;have to manually accept the Check Point CA fingerprint when the client connects for the first time. Since we try to discourage users from just clicking YES to everything, we tried to communicate this to our users through email ahead of time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 18:02:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26423#M89151</guid>
      <dc:creator>Daniel_Taney</dc:creator>
      <dc:date>2019-01-22T18:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26424#M89152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've noticed some of my test clients see the fingerprint popup, and some trust right away. Both have received the same certificates from Group policy. I'm going to try and figure out why, but I'll likely still inform them prior to deployment, as we have lots of different devices and OS's deployed that may act differently.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 18:06:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26424#M89152</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-22T18:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26425#M89153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know if it is of any use to you, but you could configure the configuration to be stored in Active Directory? This will store both the "Trusted Gateways" with their fingerprint and also the rule configuration that ties in a AD site or IP range to a particular gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Distributed configuration tool installs as part of the Identity Agent on the client machine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To set it up is really easy, just open the distributed configuration tool with an account that has administrative permissions within the domain and it automatically creates the CheckPoint container in the default naming context in AD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client will then check AD each time to locate the best IA server to use.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should resolve your fingerprint issue and removes the decision from the user to accept the fingerprint of the gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2019 06:36:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26425#M89153</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-01-24T06:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26426#M89154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;Sorry for the late reply, I was away on break.&lt;/P&gt;&lt;P&gt;I've tried the distributed configuration tool without success, but I'll give it another attempt.&lt;/P&gt;&lt;P&gt;I'm unable to find the container it is supposed to create, Where in AD can I verify if the distributed configuration tool created the container properly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 13:14:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26426#M89154</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-30T13:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26427#M89155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not a problem at all. To view the container in Active Directory you will need to open ADSIEdit.msc and connect to your domains "Default naming Context". You should be able to browse the structure to dc=&amp;lt;domain&amp;gt;,&amp;lt;dc=local&amp;gt;,CN=Program Data,CN=Check Poiint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you ran the Distributed Configuration Tool, was it run with an account that has administrative permissions in the domain?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 13:55:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26427#M89155</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-01-30T13:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26428#M89156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've found the program data entry for it now, however the two containers are empty. What would they normally contain?&lt;/P&gt;&lt;P&gt;I did the creation with an account that has admin permissions.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78038_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:00:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26428#M89156</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-30T14:00:58Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26429#M89157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is great. That looks good. I wouldn't expect to see anything as such in these. Can you screenshot your Distributed Tool configuration output please? When you open the tool you should see any entries that you had entered before.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:04:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26429#M89157</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-01-30T14:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26430#M89158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty simply, we just have the one server, it's fingerprint correctly shows in the trusted gateways&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78039_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:19:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26430#M89158</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-30T14:19:09Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26431#M89159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks David. That looks good to me. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;Is your identity agent on your client set to automatically detect the gateway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I am assuming that your Gateway also has the Identity Awareness blade enabled and the identity source set as Identity Agent on your gateway configuration? If you can share your gateways Identity Agent configuration as well please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:23:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26431#M89159</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-01-30T14:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26432#M89160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After testing a few more clients, this seems to be working well for the identity agent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am noticing some problems with the terminal server agent running on windows 10 clients. We have some computers that multiple users sign on to, and use the fast user switching function, so we were going to use the MUH for them. They are connecting successfully, but no users are detected. This seems similar to&amp;nbsp;sk113732, however this is windows 10 which is compatible with sha2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78040_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:34:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26432#M89160</guid>
      <dc:creator>NorthernNetGuy</dc:creator>
      <dc:date>2019-01-30T14:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Agent - Auto Detecting gateway</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26433#M89161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So just to review where we are at. The normal identity agent is working as expected on Windows 10 machines now, and the issue currently lies with the MUH Agent?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any error displayed within the gateway logs? Filter search. "blade:Identity Awareness" that may relate to the issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 14:48:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Agent-Auto-Detecting-gateway/m-p/26433#M89161</guid>
      <dc:creator>Mark_Mitchell</dc:creator>
      <dc:date>2019-01-30T14:48:12Z</dc:date>
    </item>
  </channel>
</rss>

