<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness getting DC Name only in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16071#M2677</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/47844"&gt;Vladimir Yakovlev&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;I just noticed that the IP you are querying for -&amp;nbsp;10.101.25.16, is the DC itself.&lt;/P&gt;&lt;P&gt;AD Query (and also IDC) are automatically not associating this IP as this is the DC IP.&lt;/P&gt;&lt;P&gt;If the problem is with&amp;nbsp;&lt;STRONG&gt;all&lt;/STRONG&gt; machines / users in the environment, please open a ticket with TAC as this needs to be further investigated.&lt;/P&gt;&lt;P&gt;If you want to start first investigating it on your own, I can suggest debugging PDP and try to see where the issue falls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. enable debug:&lt;/P&gt;&lt;P&gt;# pdp d s all all&lt;/P&gt;&lt;P&gt;2. replicate the issue - login with the user&lt;/P&gt;&lt;P&gt;3. disable debug:&lt;/P&gt;&lt;P&gt;# pdp d u all&lt;/P&gt;&lt;P&gt;4. search for this IP / user / machine in $FWDIR/log/pdpd.elg* files (up to 10 files).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;Royi Priov&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;Team Leader, Identity Awareness R&amp;amp;D.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Nov 2018 11:32:03 GMT</pubDate>
    <dc:creator>Royi_Priov</dc:creator>
    <dc:date>2018-11-25T11:32:03Z</dc:date>
    <item>
      <title>Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16059#M2665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any suggestions what I may have done to cause this?&lt;/P&gt;&lt;P&gt;This is a lab environment, so I can do whatever I want with it.&lt;/P&gt;&lt;P&gt;Freshly installed 2016 domain controller.&lt;/P&gt;&lt;P&gt;IA enabled with wizard and successfully created LDAP account unit.&lt;/P&gt;&lt;P&gt;adlog a query all returns just DC, no users or other domain member PCs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway and management are R80.10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 02:10:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16059#M2665</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-13T02:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16060#M2666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Haven't used AD query since 2014.. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;all our environment relies on IDC. Forgotten most things about AD queries. But show us what you see, which commands / logs you are looking at?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;adlog a dc&lt;/P&gt;&lt;P&gt;adlog a q a&amp;nbsp;&lt;/P&gt;&lt;P&gt;pdp m a&lt;/P&gt;&lt;P&gt;pep s p a&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 07:47:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16060#M2666</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-13T07:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16061#M2667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's bit more from old stuff that I have saved &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;check that you see AD event logs in bold in your DC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After being configured, AD Query (ADQ) begins communication with all of the Domain Controllers in the configured account unit. The communication is a WMI query (over DCE-RPC), registering to receive all relevant Security Event logs from the Domain Controller. (For Windows 2003 Domain Controllers, events 672,673 and 674 are fetched, while for Windows 2008 Domain Controllers events &lt;STRONG&gt;4624, 4768, 4769 and 4770&lt;/STRONG&gt; are fetched.) From then on, any new relevant Security Event log will be sent to the Security Gateway, seconds from its creation time. AD Query (ADQ) does pull the Security Event log from the Active Directory every second (1 second) or the Active Directory pushes the latest 100 events to the Security Gateway that runs AD Query (ADQ).&lt;/P&gt;&lt;P&gt;The registration mechanism allows AD Query (ADQ) to receive new Security Event logs in a timely manner (up to several seconds from generation time). It does not generate a lot of burden on the Domain Controller, as it already has the message in its memory, when it is sent to AD Query (ADQ). Real life deployments on running AD environments, measured up to a 3% increase in CPU usage on the Domain Controllers, with an average of much less than 1%.&lt;/P&gt;&lt;P&gt;Most of the problems with AD Query (ADQ) happen in the communication phase since WMI runs over DCE-RPC, which is a complicated and non firewall-friendly protocol (it starts on port 135 but later moves on to a dynamically coordinated port). The first thing that you want to check when AD Query (ADQ) is not working is if something, on the local Security Gateway, or on the way to the Domain Controller is blocking this traffic. Refer to sk58881 (AD Query traffic dropped by Check Point Security Gateway), for further details about how to diagnose and handle such problems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 07:52:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16061#M2667</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-13T07:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16062#M2668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Kaspars.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# &lt;STRONG&gt;ps aux | grep pdp&lt;/STRONG&gt;&lt;BR /&gt;admin 8456 0.0 1.0 213856 39432 ? Sl Nov12 0:24 pdpd 0 -t&lt;BR /&gt;admin 17748 0.0 0.0 1736 500 pts/2 S+ 08:23 0:00 grep pdp&lt;BR /&gt;[Expert@GW8010:0]# &lt;STRONG&gt;adlog a dc&lt;/STRONG&gt;&lt;BR /&gt;Domain controllers:&lt;BR /&gt;Domain Name IP Address Events (last hour) Connection state&lt;BR /&gt;============================================================================================================&lt;BR /&gt;higherintelligence.com 10.101.25.16 142 has connection&lt;/P&gt;&lt;P&gt;Ignored domain controllers on this gateway:&lt;BR /&gt;No ignored domain controllers found.&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# &lt;STRONG&gt;adlog a q a&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;ip: 10.101.25.16 --&amp;gt; Machines: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:dc2016@higherintelligence.com"&gt;dc2016@higherintelligence.com&lt;/A&gt;&lt;SPAN&gt;;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# &lt;STRONG&gt;pdp m a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Session: a28c7f3c&lt;BR /&gt;Session UUID: {489CFED8-015F-BB42-9E52-1AF88BDFC3EE}&lt;BR /&gt;Ip: 10.101.25.16&lt;BR /&gt;Machine:&lt;BR /&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:dc2016@higherintelligence.com"&gt;dc2016@higherintelligence.com&lt;/A&gt;&lt;SPAN&gt; {64948b77}&lt;/SPAN&gt;&lt;BR /&gt; Groups: All Machines&lt;BR /&gt; Roles: Internet_Users;TestRole1&lt;BR /&gt; Client Type: AD Query&lt;BR /&gt; Authentication Method: Trust&lt;BR /&gt; Distinguished Name: CN=DC2016,OU=Domain Controllers,DC=higherintelligence,DC=com&lt;BR /&gt; Connect Time: Mon Nov 12 18:36:27 2018&lt;BR /&gt; Next Reauthentication: Tue Nov 13 20:22:18 2018&lt;BR /&gt; Next Connectivity Check: Tue Nov 13 20:22:18 2018&lt;BR /&gt; Next Ldap Fetch: Tue Nov 13 10:30:57 2018&lt;/P&gt;&lt;P&gt;Packet Tagging Status: Not Active&lt;BR /&gt;Published Gateways: Local&lt;BR /&gt;************************************************************************************&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# &lt;STRONG&gt;pep s p a&lt;/STRONG&gt;&lt;BR /&gt;Command: root-&amp;gt;show-&amp;gt;pdp-&amp;gt;all&lt;BR /&gt;Source IP ID Connect time Users&lt;BR /&gt;=========================================================&lt;BR /&gt;127.0.0.1 0x0 12Nov2018 18:35:06 1&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The infuriating thing is that when I am going through the access role creation process, and querying the directory for users and groups, I can see them just fine:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74164_pastedImage_8.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74168_pastedImage_9.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the query must be working.&lt;/P&gt;&lt;P&gt;It is just the actual IA that does not and the diagnostics seem to indicate that query returns only DC data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DC is configured to perform the Audit for Success and Failure in Domain Controller and on the Local Machine.&lt;/P&gt;&lt;P&gt;And I suspect that the "adlog a q a" should pull all the data available from AD.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 13:42:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16062#M2668</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-13T13:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16063#M2669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you see those AD event logs generated in DC for one of the computers / users (&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold; font-size: 14px;"&gt;&lt;STRONG&gt;4624, 4768, 4769 and 4770&lt;/STRONG&gt;&lt;/SPAN&gt;) as those are the ones that will trigger updates to firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try adding portal so you can log in manually from a machine &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;that should push your ID out to gateway&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 15:51:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16063#M2669</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-13T15:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16064#M2670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Log Name: Security&lt;BR /&gt;Source: Microsoft-Windows-Security-Auditing&lt;BR /&gt;Date: 11/13/2018 12:26:15 PM&lt;BR /&gt;Event ID: &lt;STRONG&gt;4624&lt;/STRONG&gt;&lt;BR /&gt;Task Category: Logon&lt;BR /&gt;Level: Information&lt;BR /&gt;Keywords: Audit Success&lt;BR /&gt;User: N/A&lt;BR /&gt;Computer: DC2016.higherintelligence.com&lt;BR /&gt;Description:&lt;BR /&gt;An account was successfully logged on.&lt;/P&gt;&lt;P&gt;Subject:&lt;BR /&gt; Security ID: NULL SID&lt;BR /&gt; Account Name: -&lt;BR /&gt; Account Domain: -&lt;BR /&gt; Logon ID: 0x0&lt;/P&gt;&lt;P&gt;Logon Information:&lt;BR /&gt; Logon Type: 3&lt;BR /&gt; Restricted Admin Mode: -&lt;BR /&gt; Virtual Account: No&lt;BR /&gt; Elevated Token: Yes&lt;/P&gt;&lt;P&gt;Impersonation Level: Delegation&lt;/P&gt;&lt;P&gt;New Logon:&lt;BR /&gt; Security ID: HI\aduser1&lt;BR /&gt; Account Name: aduser1&lt;BR /&gt; Account Domain: HIGHERINTELLIGENCE.COM&lt;BR /&gt; Logon ID: 0x1104289&lt;BR /&gt; Linked Logon ID: 0x0&lt;BR /&gt; Network Account Name: -&lt;BR /&gt; Network Account Domain: -&lt;BR /&gt; Logon GUID: {248b4494-396f-2538-be76-9e0773f89dea}&lt;/P&gt;&lt;P&gt;Process Information:&lt;BR /&gt; Process ID: 0x0&lt;BR /&gt; Process Name: -&lt;/P&gt;&lt;P&gt;Network Information:&lt;BR /&gt; Workstation Name: -&lt;BR /&gt; Source Network Address: 10.101.25.1&lt;BR /&gt; Source Port: 10044&lt;/P&gt;&lt;P&gt;Detailed Authentication Information:&lt;BR /&gt; Logon Process: Kerberos&lt;BR /&gt; Authentication Package: Kerberos&lt;BR /&gt; Transited Services: -&lt;BR /&gt; Package Name (NTLM only): -&lt;BR /&gt; Key Length: 0&lt;/P&gt;&lt;P&gt;This event is generated when a logon session is created. It is generated on the computer that was accessed.&lt;/P&gt;&lt;P&gt;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;/P&gt;&lt;P&gt;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&lt;/P&gt;&lt;P&gt;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&lt;/P&gt;&lt;P&gt;The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.&lt;/P&gt;&lt;P&gt;The impersonation level field indicates the extent to which a process in the logon session can impersonate.&lt;/P&gt;&lt;P&gt;The authentication information fields provide detailed information about this specific logon request.&lt;BR /&gt; - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.&lt;BR /&gt; - Transited services indicate which intermediate services have participated in this logon request.&lt;BR /&gt; - Package name indicates which sub-protocol was used among the NTLM protocols.&lt;BR /&gt; - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.&lt;BR /&gt;Event Xml:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;Event xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://schemas.microsoft.com/win/2004/08/events/event" rel="nofollow"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;"&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;System&amp;gt;&lt;BR /&gt; &amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /&amp;gt;&lt;BR /&gt; &amp;lt;EventID&amp;gt;4624&amp;lt;/EventID&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;2&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&lt;BR /&gt; &amp;lt;Task&amp;gt;12544&amp;lt;/Task&amp;gt;&lt;BR /&gt; &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;BR /&gt; &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&lt;BR /&gt; &amp;lt;TimeCreated SystemTime="2018-11-13T17:26:15.547179600Z" /&amp;gt;&lt;BR /&gt; &amp;lt;EventRecordID&amp;gt;45317&amp;lt;/EventRecordID&amp;gt;&lt;BR /&gt; &amp;lt;Correlation ActivityID="{36945420-7AF4-0000-2B54-9436F47AD401}" /&amp;gt;&lt;BR /&gt; &amp;lt;Execution ProcessID="648" ThreadID="688" /&amp;gt;&lt;BR /&gt; &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&lt;BR /&gt; &amp;lt;Computer&amp;gt;DC2016.higherintelligence.com&amp;lt;/Computer&amp;gt;&lt;BR /&gt; &amp;lt;Security /&amp;gt;&lt;BR /&gt; &amp;lt;/System&amp;gt;&lt;BR /&gt; &amp;lt;EventData&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectUserSid"&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectUserName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectDomainName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectLogonId"&amp;gt;0x0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-1103&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserName"&amp;gt;aduser1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetDomainName"&amp;gt;HIGHERINTELLIGENCE.COM&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetLogonId"&amp;gt;0x1104289&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LogonType"&amp;gt;3&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LogonProcessName"&amp;gt;Kerberos&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="AuthenticationPackageName"&amp;gt;Kerberos&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="WorkstationName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LogonGuid"&amp;gt;{248B4494-396F-2538-BE76-9E0773F89DEA}&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TransmittedServices"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LmPackageName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="KeyLength"&amp;gt;0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ProcessId"&amp;gt;0x0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ProcessName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpAddress"&amp;gt;10.101.25.1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpPort"&amp;gt;10044&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ImpersonationLevel"&amp;gt;%%1840&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="RestrictedAdminMode"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetOutboundUserName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetOutboundDomainName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="VirtualAccount"&amp;gt;%%1843&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetLinkedLogonId"&amp;gt;0x0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ElevatedToken"&amp;gt;%%1842&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/EventData&amp;gt;&lt;BR /&gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Log Name: Security&lt;BR /&gt;Source: Microsoft-Windows-Security-Auditing&lt;BR /&gt;Date: 11/13/2018 12:51:26 PM&lt;BR /&gt;Event ID: &lt;STRONG&gt;4768&lt;/STRONG&gt;&lt;BR /&gt;Task Category: Kerberos Authentication Service&lt;BR /&gt;Level: Information&lt;BR /&gt;Keywords: Audit Success&lt;BR /&gt;User: N/A&lt;BR /&gt;Computer: DC2016.higherintelligence.com&lt;BR /&gt;Description:&lt;BR /&gt;A Kerberos authentication ticket (TGT) was requested.&lt;/P&gt;&lt;P&gt;Account Information:&lt;BR /&gt; Account Name: WIN10NET30$&lt;BR /&gt; Supplied Realm Name: higherintelligence.com&lt;BR /&gt; User ID: HI\WIN10NET30$&lt;/P&gt;&lt;P&gt;Service Information:&lt;BR /&gt; Service Name: krbtgt&lt;BR /&gt; Service ID: HI\krbtgt&lt;/P&gt;&lt;P&gt;Network Information:&lt;BR /&gt; Client Address: ::ffff:10.101.25.1&lt;BR /&gt; Client Port: 10105&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt; Ticket Options: 0x40810010&lt;BR /&gt; Result Code: 0x0&lt;BR /&gt; Ticket Encryption Type: 0x12&lt;BR /&gt; Pre-Authentication Type: 2&lt;/P&gt;&lt;P&gt;Certificate Information:&lt;BR /&gt; Certificate Issuer Name: &lt;BR /&gt; Certificate Serial Number: &lt;BR /&gt; Certificate Thumbprint:&lt;/P&gt;&lt;P&gt;Certificate information is only provided if a certificate was used for pre-authentication.&lt;/P&gt;&lt;P&gt;Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.&lt;BR /&gt;Event Xml:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;Event xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://schemas.microsoft.com/win/2004/08/events/event" rel="nofollow"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;"&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;System&amp;gt;&lt;BR /&gt; &amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /&amp;gt;&lt;BR /&gt; &amp;lt;EventID&amp;gt;4768&amp;lt;/EventID&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&lt;BR /&gt; &amp;lt;Task&amp;gt;14339&amp;lt;/Task&amp;gt;&lt;BR /&gt; &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;BR /&gt; &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&lt;BR /&gt; &amp;lt;TimeCreated SystemTime="2018-11-13T17:51:26.755926600Z" /&amp;gt;&lt;BR /&gt; &amp;lt;EventRecordID&amp;gt;45760&amp;lt;/EventRecordID&amp;gt;&lt;BR /&gt; &amp;lt;Correlation /&amp;gt;&lt;BR /&gt; &amp;lt;Execution ProcessID="648" ThreadID="2628" /&amp;gt;&lt;BR /&gt; &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&lt;BR /&gt; &amp;lt;Computer&amp;gt;DC2016.higherintelligence.com&amp;lt;/Computer&amp;gt;&lt;BR /&gt; &amp;lt;Security /&amp;gt;&lt;BR /&gt; &amp;lt;/System&amp;gt;&lt;BR /&gt; &amp;lt;EventData&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserName"&amp;gt;WIN10NET30$&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetDomainName"&amp;gt;higherintelligence.com&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-1106&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ServiceName"&amp;gt;krbtgt&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ServiceSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-502&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TicketOptions"&amp;gt;0x40810010&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="Status"&amp;gt;0x0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TicketEncryptionType"&amp;gt;0x12&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="PreAuthType"&amp;gt;2&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpAddress"&amp;gt;::ffff:10.101.25.1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpPort"&amp;gt;10105&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="CertIssuerName"&amp;gt;&lt;BR /&gt; &amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="CertSerialNumber"&amp;gt;&lt;BR /&gt; &amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="CertThumbprint"&amp;gt;&lt;BR /&gt; &amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/EventData&amp;gt;&lt;BR /&gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---&lt;/P&gt;&lt;P&gt;Log Name: Security&lt;BR /&gt;Source: Microsoft-Windows-Security-Auditing&lt;BR /&gt;Date: 11/13/2018 12:26:15 PM&lt;BR /&gt;Event ID: &lt;STRONG&gt;4769&lt;/STRONG&gt;&lt;BR /&gt;Task Category: Kerberos Service Ticket Operations&lt;BR /&gt;Level: Information&lt;BR /&gt;Keywords: Audit Success&lt;BR /&gt;User: N/A&lt;BR /&gt;Computer: DC2016.higherintelligence.com&lt;BR /&gt;Description:&lt;BR /&gt;A Kerberos service ticket was requested.&lt;/P&gt;&lt;P&gt;Account Information:&lt;BR /&gt;&lt;SPAN&gt; Account Name: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt; Account Domain: HIGHERINTELLIGENCE.COM&lt;BR /&gt; Logon GUID: {4cfa961d-3e55-139f-f480-8f0d932fbb67}&lt;/P&gt;&lt;P&gt;Service Information:&lt;BR /&gt; Service Name: DC2016$&lt;BR /&gt; Service ID: HI\DC2016$&lt;/P&gt;&lt;P&gt;Network Information:&lt;BR /&gt; Client Address: ::ffff:10.101.25.1&lt;BR /&gt; Client Port: 10045&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt; Ticket Options: 0x40810000&lt;BR /&gt; Ticket Encryption Type: 0x12&lt;BR /&gt; Failure Code: 0x0&lt;BR /&gt; Transited Services: -&lt;/P&gt;&lt;P&gt;This event is generated every time access is requested to a resource such as a computer or a Windows service. The service name indicates the resource to which access was requested.&lt;/P&gt;&lt;P&gt;This event can be correlated with Windows logon events by comparing the Logon GUID fields in each event. The logon event occurs on the machine that was accessed, which is often a different machine than the domain controller which issued the service ticket.&lt;/P&gt;&lt;P&gt;Ticket options, encryption types, and failure codes are defined in RFC 4120.&lt;BR /&gt;Event Xml:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;Event xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://schemas.microsoft.com/win/2004/08/events/event" rel="nofollow"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;"&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;System&amp;gt;&lt;BR /&gt; &amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /&amp;gt;&lt;BR /&gt; &amp;lt;EventID&amp;gt;4769&amp;lt;/EventID&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&lt;BR /&gt; &amp;lt;Task&amp;gt;14337&amp;lt;/Task&amp;gt;&lt;BR /&gt; &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;BR /&gt; &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&lt;BR /&gt; &amp;lt;TimeCreated SystemTime="2018-11-13T17:26:15.544915700Z" /&amp;gt;&lt;BR /&gt; &amp;lt;EventRecordID&amp;gt;45316&amp;lt;/EventRecordID&amp;gt;&lt;BR /&gt; &amp;lt;Correlation /&amp;gt;&lt;BR /&gt; &amp;lt;Execution ProcessID="648" ThreadID="1780" /&amp;gt;&lt;BR /&gt; &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&lt;BR /&gt; &amp;lt;Computer&amp;gt;DC2016.higherintelligence.com&amp;lt;/Computer&amp;gt;&lt;BR /&gt; &amp;lt;Security /&amp;gt;&lt;BR /&gt; &amp;lt;/System&amp;gt;&lt;BR /&gt; &amp;lt;EventData&amp;gt;&lt;BR /&gt;&lt;SPAN&gt; &amp;lt;Data Name="TargetUserName"&amp;gt;&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;SPAN&gt;&amp;lt;/Data&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;Data Name="TargetDomainName"&amp;gt;HIGHERINTELLIGENCE.COM&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ServiceName"&amp;gt;DC2016$&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ServiceSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-1000&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TicketOptions"&amp;gt;0x40810000&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TicketEncryptionType"&amp;gt;0x12&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpAddress"&amp;gt;::ffff:10.101.25.1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpPort"&amp;gt;10045&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="Status"&amp;gt;0x0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LogonGuid"&amp;gt;{4CFA961D-3E55-139F-F480-8F0D932FBB67}&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TransmittedServices"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/EventData&amp;gt;&lt;BR /&gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Log Name: Security&lt;BR /&gt;Source: Microsoft-Windows-Security-Auditing&lt;BR /&gt;Date: 11/13/2018 12:12:24 PM&lt;BR /&gt;Event ID: &lt;STRONG&gt;4627&lt;/STRONG&gt;&lt;BR /&gt;Task Category: Group Membership&lt;BR /&gt;Level: Information&lt;BR /&gt;Keywords: Audit Success&lt;BR /&gt;User: N/A&lt;BR /&gt;Computer: DC2016.higherintelligence.com&lt;BR /&gt;Description:&lt;BR /&gt;Group membership information.&lt;/P&gt;&lt;P&gt;Subject:&lt;BR /&gt; Security ID: NULL SID&lt;BR /&gt; Account Name: -&lt;BR /&gt; Account Domain: -&lt;BR /&gt; Logon ID: 0x0&lt;/P&gt;&lt;P&gt;Logon Type: 3&lt;/P&gt;&lt;P&gt;New Logon:&lt;BR /&gt; Security ID: HI\aduser1&lt;BR /&gt; Account Name: aduser1&lt;BR /&gt; Account Domain: HIGHERINTELLIGENCE.COM&lt;BR /&gt; Logon ID: 0x10E73C2&lt;/P&gt;&lt;P&gt;Event in sequence: 1 of 1&lt;/P&gt;&lt;P&gt;Group Membership: &lt;BR /&gt; HI\Domain Users&lt;BR /&gt; Everyone&lt;BR /&gt; BUILTIN\Users&lt;BR /&gt; BUILTIN\Pre-Windows 2000 Compatible Access&lt;BR /&gt; NT AUTHORITY\NETWORK&lt;BR /&gt; NT AUTHORITY\Authenticated Users&lt;BR /&gt; NT AUTHORITY\This Organization&lt;BR /&gt; Authentication authority asserted identity&lt;BR /&gt; Mandatory Label\Medium Plus Mandatory Level&lt;/P&gt;&lt;P&gt;The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.&lt;/P&gt;&lt;P&gt;The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).&lt;/P&gt;&lt;P&gt;The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.&lt;/P&gt;&lt;P&gt;This event is generated when the Audit Group Membership subcategory is configured. The Logon ID field can be used to correlate this event with the corresponding user logon event as well as to any other security audit events generated during this logon session.&lt;BR /&gt;Event Xml:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;Event xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://schemas.microsoft.com/win/2004/08/events/event" rel="nofollow"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;"&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;System&amp;gt;&lt;BR /&gt; &amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /&amp;gt;&lt;BR /&gt; &amp;lt;EventID&amp;gt;4627&amp;lt;/EventID&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&lt;BR /&gt; &amp;lt;Task&amp;gt;12554&amp;lt;/Task&amp;gt;&lt;BR /&gt; &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;BR /&gt; &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&lt;BR /&gt; &amp;lt;TimeCreated SystemTime="2018-11-13T17:12:24.939948800Z" /&amp;gt;&lt;BR /&gt; &amp;lt;EventRecordID&amp;gt;45182&amp;lt;/EventRecordID&amp;gt;&lt;BR /&gt; &amp;lt;Correlation ActivityID="{36945420-7AF4-0000-2B54-9436F47AD401}" /&amp;gt;&lt;BR /&gt; &amp;lt;Execution ProcessID="648" ThreadID="4656" /&amp;gt;&lt;BR /&gt; &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&lt;BR /&gt; &amp;lt;Computer&amp;gt;DC2016.higherintelligence.com&amp;lt;/Computer&amp;gt;&lt;BR /&gt; &amp;lt;Security /&amp;gt;&lt;BR /&gt; &amp;lt;/System&amp;gt;&lt;BR /&gt; &amp;lt;EventData&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectUserSid"&amp;gt;S-1-0-0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectUserName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectDomainName"&amp;gt;-&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="SubjectLogonId"&amp;gt;0x0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-1103&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserName"&amp;gt;aduser1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetDomainName"&amp;gt;HIGHERINTELLIGENCE.COM&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetLogonId"&amp;gt;0x10e73c2&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LogonType"&amp;gt;3&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="EventIdx"&amp;gt;1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="EventCountTotal"&amp;gt;1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="GroupMembership"&amp;gt;&lt;BR /&gt; %{S-1-5-21-2916104119-1630943108-1692471290-513}&lt;BR /&gt; %{S-1-1-0}&lt;BR /&gt; %{S-1-5-32-545}&lt;BR /&gt; %{S-1-5-32-554}&lt;BR /&gt; %{S-1-5-2}&lt;BR /&gt; %{S-1-5-11}&lt;BR /&gt; %{S-1-5-15}&lt;BR /&gt; %{S-1-18-1}&lt;BR /&gt; %{S-1-16-8448}&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/EventData&amp;gt;&lt;BR /&gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Log Name: Security&lt;BR /&gt;Source: Microsoft-Windows-Security-Auditing&lt;BR /&gt;Date: 11/13/2018 6:49:34 AM&lt;BR /&gt;Event ID: &lt;STRONG&gt;4770&lt;/STRONG&gt;&lt;BR /&gt;Task Category: Kerberos Service Ticket Operations&lt;BR /&gt;Level: Information&lt;BR /&gt;Keywords: Audit Success&lt;BR /&gt;User: N/A&lt;BR /&gt;Computer: DC2016.higherintelligence.com&lt;BR /&gt;Description:&lt;BR /&gt;A Kerberos service ticket was renewed.&lt;/P&gt;&lt;P&gt;Account Information:&lt;BR /&gt;&lt;SPAN&gt; Account Name: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:Administrator@HIGHERINTELLIGENCE.COM"&gt;Administrator@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt; Account Domain: HIGHERINTELLIGENCE.COM&lt;/P&gt;&lt;P&gt;Service Information:&lt;BR /&gt; Service Name: krbtgt&lt;BR /&gt; Service ID: HI\krbtgt&lt;/P&gt;&lt;P&gt;Network Information:&lt;BR /&gt; Client Address: ::1&lt;BR /&gt; Client Port: 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt; Ticket Options: 0x10002&lt;BR /&gt; Ticket Encryption Type: 0x12&lt;/P&gt;&lt;P&gt;Ticket options and encryption types are defined in RFC 4120.&lt;BR /&gt;Event Xml:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;Event xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://schemas.microsoft.com/win/2004/08/events/event" rel="nofollow"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;"&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;System&amp;gt;&lt;BR /&gt; &amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /&amp;gt;&lt;BR /&gt; &amp;lt;EventID&amp;gt;4770&amp;lt;/EventID&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&lt;BR /&gt; &amp;lt;Task&amp;gt;14337&amp;lt;/Task&amp;gt;&lt;BR /&gt; &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;BR /&gt; &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&lt;BR /&gt; &amp;lt;TimeCreated SystemTime="2018-11-13T11:49:34.012766500Z" /&amp;gt;&lt;BR /&gt; &amp;lt;EventRecordID&amp;gt;41867&amp;lt;/EventRecordID&amp;gt;&lt;BR /&gt; &amp;lt;Correlation /&amp;gt;&lt;BR /&gt; &amp;lt;Execution ProcessID="648" ThreadID="2084" /&amp;gt;&lt;BR /&gt; &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&lt;BR /&gt; &amp;lt;Computer&amp;gt;DC2016.higherintelligence.com&amp;lt;/Computer&amp;gt;&lt;BR /&gt; &amp;lt;Security /&amp;gt;&lt;BR /&gt; &amp;lt;/System&amp;gt;&lt;BR /&gt; &amp;lt;EventData&amp;gt;&lt;BR /&gt;&lt;SPAN&gt; &amp;lt;Data Name="TargetUserName"&amp;gt;&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:Administrator@HIGHERINTELLIGENCE.COM"&gt;Administrator@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;SPAN&gt;&amp;lt;/Data&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;Data Name="TargetDomainName"&amp;gt;HIGHERINTELLIGENCE.COM&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ServiceName"&amp;gt;krbtgt&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="ServiceSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-502&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TicketOptions"&amp;gt;0x10002&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TicketEncryptionType"&amp;gt;0x12&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpAddress"&amp;gt;::1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="IpPort"&amp;gt;0&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/EventData&amp;gt;&lt;BR /&gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---&lt;/P&gt;&lt;P&gt;Log Name: Security&lt;BR /&gt;Source: Microsoft-Windows-Security-Auditing&lt;BR /&gt;Date: 11/13/2018 12:10:16 PM&lt;BR /&gt;Event ID: &lt;STRONG&gt;4634&lt;/STRONG&gt;&lt;BR /&gt;Task Category: Logoff&lt;BR /&gt;Level: Information&lt;BR /&gt;Keywords: Audit Success&lt;BR /&gt;User: N/A&lt;BR /&gt;Computer: DC2016.higherintelligence.com&lt;BR /&gt;Description:&lt;BR /&gt;An account was logged off.&lt;/P&gt;&lt;P&gt;Subject:&lt;BR /&gt; Security ID: HI\WIN10NET30$&lt;BR /&gt; Account Name: WIN10NET30$&lt;BR /&gt; Account Domain: HI&lt;BR /&gt; Logon ID: 0x10D31B1&lt;/P&gt;&lt;P&gt;Logon Type: 3&lt;/P&gt;&lt;P&gt;This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.&lt;BR /&gt;Event Xml:&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;Event xmlns="&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://schemas.microsoft.com/win/2004/08/events/event" rel="nofollow"&gt;http://schemas.microsoft.com/win/2004/08/events/event&lt;/A&gt;&lt;SPAN&gt;"&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt; &amp;lt;System&amp;gt;&lt;BR /&gt; &amp;lt;Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-A5BA-3E3B0328C30D}" /&amp;gt;&lt;BR /&gt; &amp;lt;EventID&amp;gt;4634&amp;lt;/EventID&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;0&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Level&amp;gt;0&amp;lt;/Level&amp;gt;&lt;BR /&gt; &amp;lt;Task&amp;gt;12545&amp;lt;/Task&amp;gt;&lt;BR /&gt; &amp;lt;Opcode&amp;gt;0&amp;lt;/Opcode&amp;gt;&lt;BR /&gt; &amp;lt;Keywords&amp;gt;0x8020000000000000&amp;lt;/Keywords&amp;gt;&lt;BR /&gt; &amp;lt;TimeCreated SystemTime="2018-11-13T17:10:16.469434300Z" /&amp;gt;&lt;BR /&gt; &amp;lt;EventRecordID&amp;gt;45136&amp;lt;/EventRecordID&amp;gt;&lt;BR /&gt; &amp;lt;Correlation /&amp;gt;&lt;BR /&gt; &amp;lt;Execution ProcessID="648" ThreadID="688" /&amp;gt;&lt;BR /&gt; &amp;lt;Channel&amp;gt;Security&amp;lt;/Channel&amp;gt;&lt;BR /&gt; &amp;lt;Computer&amp;gt;DC2016.higherintelligence.com&amp;lt;/Computer&amp;gt;&lt;BR /&gt; &amp;lt;Security /&amp;gt;&lt;BR /&gt; &amp;lt;/System&amp;gt;&lt;BR /&gt; &amp;lt;EventData&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserSid"&amp;gt;S-1-5-21-2916104119-1630943108-1692471290-1106&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetUserName"&amp;gt;WIN10NET30$&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetDomainName"&amp;gt;HI&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="TargetLogonId"&amp;gt;0x10d31b1&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;Data Name="LogonType"&amp;gt;3&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/EventData&amp;gt;&lt;BR /&gt;&amp;lt;/Event&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But while these are pertinent for IA to work, I am still uncertain why &lt;STRONG&gt;adlog a q a&lt;/STRONG&gt; does not pull the directory objects in.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 18:24:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16064#M2670</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-13T18:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16065#M2671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try portal too. Just out of curiosity. Else hard to say - haven't used ad query approach for many years. I believe IDC is not an option to you?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 20:11:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16065#M2671</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-13T20:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16066#M2672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Kaspars. Unfortunately, you can see that the DC is logging for all its worth but to no avail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/46230"&gt;Royi Priov&lt;/A&gt;‌, can I get your input on this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW:&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# $FWDIR/bin/test_ad_connectivity -o /var/log/test_ad_connectivity.txt -d higherintelligence.com -i 10.101.25.16 -u checkpoint -D CN=checkpoint,CN=Users,DC=higherintelligence,DC=com -a&lt;BR /&gt;Please enter checkpoint (DN=CN=checkpoint,CN=Users,DC=higherintelligence,DC=com) password:&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# cat /var/log/test_ad_connectivity.txt&lt;BR /&gt;(&lt;BR /&gt; :status (SUCCESS_LDAP_WMI)&lt;BR /&gt; :err_msg ("ADLOG_SUCCESS;LDAP_SUCCESS")&lt;BR /&gt; :ldap_status (LDAP_SUCCESS)&lt;BR /&gt; :wmi_status (ADLOG_SUCCESS)&lt;BR /&gt; :timestamp ("Thu Nov 15 14:48:32 2018")&lt;BR /&gt;)&lt;BR /&gt;[Expert@GW8010:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Vladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 19:53:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16066#M2672</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-15T19:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting Machine Names only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16067#M2673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Royi is the right call.. I can't remember much about adlog queries and we rub R77.30 back then..&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 21:16:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16067#M2673</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-15T21:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16068#M2674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have reviewed most of the information written in this thread.&amp;nbsp;&lt;BR /&gt;Let's summarize the facts (correct me if I'm&amp;nbsp;missing something):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;ADQ was configured with one DC server.&lt;/LI&gt;&lt;LI&gt;A user is logged in but you don't see the event on the GW side &lt;EM&gt;(&lt;/EM&gt;adlog a q&lt;EM&gt; a)&lt;/EM&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few things to check to see where the issue falls:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is indeed the user indeed logs in front of&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;10.101.25.16 DC? can be tested with "&lt;EM&gt;echo %LOGONSERVER%&lt;/EM&gt;" on the endpoint PC.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;please review $FWDIR/log/pdpd.elg files (you can start without debugging) and see the event processing. We might get the event but drops it for some reason.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Royi Priov&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Team Leader, Identity Awareness R&amp;amp;D.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 11:19:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16068#M2674</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2018-11-18T11:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16069#M2675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Royi. Thank you for looking into this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client Was rebooted and logged onto domain successfully:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74592_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With DNS traffic filtered out in logs, the communication between Win10Net30 and DC2016 looks like:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74593_pastedImage_4.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While the only IA events visible are:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74636_pastedImage_5.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[8456 4105705232]@GW8010[18 Nov 9:03:16] [TRACKER]: #1624 -&amp;gt; INCOMING -&amp;gt; ADQUERY_ASSOCIATION -&amp;gt;&lt;BR /&gt;Association&lt;BR /&gt;ip: 10.101.25.16&lt;BR /&gt;user:&lt;BR /&gt;machine: dc2016&lt;BR /&gt;domain: higherintelligence.com&lt;BR /&gt;reason: 0&lt;BR /&gt;[8456 4105705232]@GW8010[18 Nov 9:08:16] [TRACKER]: #1625 -&amp;gt; INCOMING -&amp;gt; ADQUERY_ASSOCIATION -&amp;gt;&lt;BR /&gt;Association&lt;BR /&gt;ip: 10.101.25.16&lt;BR /&gt;user:&lt;BR /&gt;machine: dc2016&lt;BR /&gt;domain: higherintelligence.com&lt;BR /&gt;reason: 0&lt;BR /&gt;[8456 4105705232]@GW8010[18 Nov 9:13:16] [TRACKER]: #1626 -&amp;gt; INCOMING -&amp;gt; ADQUERY_ASSOCIATION -&amp;gt;&lt;BR /&gt;Association&lt;BR /&gt;ip: 10.101.25.16&lt;BR /&gt;user:&lt;BR /&gt;machine: dc2016&lt;BR /&gt;domain: higherintelligence.com&lt;BR /&gt;reason: 0&lt;BR /&gt;[8456]@GW8010[18 Nov 9:15:33] Warning:cp_timed_blocker_handler: A handler [0xf78c5bb0] blocked for 6 seconds.&lt;BR /&gt;[8456]@GW8010[18 Nov 9:15:33] Warning:cp_timed_blocker_handler: Handler info: Library [/opt/CPsuite-R80/fw1/lib/libpdplib.so], Function offset [0x102bb0].&lt;BR /&gt;[8456]@GW8010[18 Nov 9:15:33] Warning:cp_timed_blocker_handler: Handler info: Nearest symbol name [_ZN3pdp13ClusterHelper10s_ReportUpEPv], offset [0x102bb0].&lt;BR /&gt;[8456]@GW8010[18 Nov 9:17:20] Warning:cp_timed_blocker_handler: A handler [0xf78c5bb0] blocked for 16 seconds.&lt;BR /&gt;[8456]@GW8010[18 Nov 9:17:20] Warning:cp_timed_blocker_handler: Handler info: Library [/opt/CPsuite-R80/fw1/lib/libpdplib.so], Function offset [0x102bb0].&lt;BR /&gt;[8456]@GW8010[18 Nov 9:17:20] Warning:cp_timed_blocker_handler: Handler info: Nearest symbol name [_ZN3pdp13ClusterHelper10s_ReportUpEPv], offset [0x102bb0].&lt;BR /&gt;[8456 4105705232]@GW8010[18 Nov 9:18:17] [TRACKER]: #1627 -&amp;gt; INCOMING -&amp;gt; ADQUERY_ASSOCIATION -&amp;gt;&lt;BR /&gt;Association&lt;BR /&gt;ip: 10.101.25.16&lt;BR /&gt;user:&lt;BR /&gt;machine: dc2016&lt;BR /&gt;domain: higherintelligence.com&lt;BR /&gt;reason: 0&lt;BR /&gt;[Expert@GW8010:0]#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 14:38:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16069#M2675</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-18T14:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16070#M2676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any more suggestions?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 20:43:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16070#M2676</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-23T20:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16071#M2677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/47844"&gt;Vladimir Yakovlev&lt;/A&gt;‌&lt;/P&gt;&lt;P&gt;I just noticed that the IP you are querying for -&amp;nbsp;10.101.25.16, is the DC itself.&lt;/P&gt;&lt;P&gt;AD Query (and also IDC) are automatically not associating this IP as this is the DC IP.&lt;/P&gt;&lt;P&gt;If the problem is with&amp;nbsp;&lt;STRONG&gt;all&lt;/STRONG&gt; machines / users in the environment, please open a ticket with TAC as this needs to be further investigated.&lt;/P&gt;&lt;P&gt;If you want to start first investigating it on your own, I can suggest debugging PDP and try to see where the issue falls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. enable debug:&lt;/P&gt;&lt;P&gt;# pdp d s all all&lt;/P&gt;&lt;P&gt;2. replicate the issue - login with the user&lt;/P&gt;&lt;P&gt;3. disable debug:&lt;/P&gt;&lt;P&gt;# pdp d u all&lt;/P&gt;&lt;P&gt;4. search for this IP / user / machine in $FWDIR/log/pdpd.elg* files (up to 10 files).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;Royi Priov&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px; font-weight: inherit;"&gt;Team Leader, Identity Awareness R&amp;amp;D.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Nov 2018 11:32:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16071#M2677</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2018-11-25T11:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16072#M2678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/46230"&gt;Royi Priov&lt;/A&gt; . Sorry for taking so long to return to this thread: I was traveling on business and away from my lab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The attempt at debug yields:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@GW8010:0]# grep -rnw $FWDIR/log/pdpd.elg -e 'aduser1'&lt;BR /&gt;1408:Username : aduser1&lt;BR /&gt;1409:Log Username : ADUser1 (aduser1)&lt;BR /&gt;1460:user: aduser1&lt;BR /&gt;1470:Username : aduser1&lt;BR /&gt;1471:Log Username : ADUser1 (aduser1)&lt;BR /&gt;2502:user: aduser1&lt;BR /&gt;2682:user: aduser1&lt;BR /&gt;2692:Username : aduser1;Administrator&lt;BR /&gt;2693:Log Username : ADUser1 (aduser1)&lt;BR /&gt;2761:user: aduser1&lt;BR /&gt;2771:Username : aduser1&lt;BR /&gt;2772:Log Username : ADUser1 (aduser1)&lt;BR /&gt;2994:Username : Administrator;aduser1&lt;BR /&gt;2995:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3066:Username : aduser1&lt;BR /&gt;3067:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3127:Username : aduser1&lt;BR /&gt;3128:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3193:Username : aduser1&lt;BR /&gt;3194:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3261:Username : aduser1&lt;BR /&gt;3262:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3336:Username : aduser1&lt;BR /&gt;3337:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3619:Username : aduser1&lt;BR /&gt;3620:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3697:Username : aduser1&lt;BR /&gt;3698:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3769:Username : aduser1&lt;BR /&gt;3770:Log Username : ADUser1 (aduser1)&lt;BR /&gt;3816:Username : aduser1&lt;BR /&gt;3817:Log Username : ADUser1 (aduser1)&lt;BR /&gt;4037:Username : aduser1&lt;BR /&gt;4038:Log Username : ADUser1 (aduser1)&lt;BR /&gt;4355:user: aduser1&lt;BR /&gt;5213:user: aduser1&lt;BR /&gt;5223:Username : aduser1&lt;BR /&gt;5224:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5371:Username : Administrator;aduser1&lt;BR /&gt;5372:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5681:Username : aduser1&lt;BR /&gt;5682:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5750:Username : Administrator;aduser1&lt;BR /&gt;5751:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5774:Username : aduser1&lt;BR /&gt;5775:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5858:Username : aduser1&lt;BR /&gt;5859:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5926:Username : aduser1&lt;BR /&gt;5927:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5941:Username : Administrator;aduser1&lt;BR /&gt;5942:Log Username : ADUser1 (aduser1)&lt;BR /&gt;5983:Username : aduser1&lt;BR /&gt;5984:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6020:Username : aduser1&lt;BR /&gt;6021:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6035:Username : Administrator;aduser1&lt;BR /&gt;6036:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6195:Username : aduser1&lt;BR /&gt;6196:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6290:user: aduser1&lt;BR /&gt;6490:Username : aduser1&lt;BR /&gt;6491:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6577:Username : aduser1&lt;BR /&gt;6578:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6637:Username : aduser1&lt;BR /&gt;6638:Log Username : ADUser1 (aduser1)&lt;BR /&gt;6697:Username : aduser1&lt;BR /&gt;6698:Log Username : ADUser1 (aduser1)&lt;BR /&gt;7387:Username : aduser1&lt;BR /&gt;7388:Log Username : ADUser1 (aduser1)&lt;BR /&gt;7466:user: aduser1&lt;BR /&gt;7888:Username : aduser1&lt;BR /&gt;7889:Log Username : ADUser1 (aduser1)&lt;BR /&gt;7956:Username : aduser1&lt;BR /&gt;7957:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8003:Username : aduser1&lt;BR /&gt;8004:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8247:Username : aduser1&lt;BR /&gt;8248:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8396:Username : aduser1&lt;BR /&gt;8397:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8444:Username : aduser1&lt;BR /&gt;8445:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8512:Username : aduser1&lt;BR /&gt;8513:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8664:Username : aduser1&lt;BR /&gt;8665:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8718:Username : aduser1&lt;BR /&gt;8719:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8770:Username : aduser1;Administrator&lt;BR /&gt;8771:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8833:Username : aduser1&lt;BR /&gt;8834:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8855:Username : aduser1;Administrator&lt;BR /&gt;8856:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8939:Username : aduser1&lt;BR /&gt;8940:Log Username : ADUser1 (aduser1)&lt;BR /&gt;8986:Username : aduser1&lt;BR /&gt;8987:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9033:Username : aduser1&lt;BR /&gt;9034:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9167:Username : aduser1&lt;BR /&gt;9168:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9214:Username : aduser1&lt;BR /&gt;9215:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9261:Username : aduser1&lt;BR /&gt;9262:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9308:Username : aduser1&lt;BR /&gt;9309:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9390:Username : aduser1&lt;BR /&gt;9391:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9437:Username : aduser1&lt;BR /&gt;9438:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9544:Username : aduser1&lt;BR /&gt;9545:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9580:Username : Administrator;aduser1&lt;BR /&gt;9581:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9738:Username : Administrator;aduser1&lt;BR /&gt;9739:Log Username : ADUser1 (aduser1)&lt;BR /&gt;9943:Username : aduser1&lt;BR /&gt;9944:Log Username : ADUser1 (aduser1)&lt;BR /&gt;10847:Username : aduser1&lt;BR /&gt;10848:Log Username : ADUser1 (aduser1)&lt;BR /&gt;10870:Username : aduser1;Administrator&lt;BR /&gt;10871:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11185:Username : aduser1&lt;BR /&gt;11186:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11320:Username : aduser1&lt;BR /&gt;11321:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11655:Username : aduser1&lt;BR /&gt;11656:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11685:Username : Administrator;aduser1&lt;BR /&gt;11686:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11763:Username : aduser1&lt;BR /&gt;11764:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11796:Username : aduser1&lt;BR /&gt;11797:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11825:Username : aduser1;Administrator&lt;BR /&gt;11826:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11901:Username : aduser1&lt;BR /&gt;11902:Log Username : ADUser1 (aduser1)&lt;BR /&gt;11923:Username : aduser1;Administrator&lt;BR /&gt;11924:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12050:Username : aduser1&lt;BR /&gt;12051:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12153:Username : aduser1&lt;BR /&gt;12154:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12217:Username : aduser1&lt;BR /&gt;12218:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12344:Username : Administrator;aduser1&lt;BR /&gt;12345:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12392:Username : aduser1&lt;BR /&gt;12393:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12432:Username : aduser1&lt;BR /&gt;12433:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12454:Username : aduser1;Administrator&lt;BR /&gt;12455:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12510:Username : aduser1&lt;BR /&gt;12511:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12532:Username : Administrator;aduser1&lt;BR /&gt;12533:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12555:Username : aduser1&lt;BR /&gt;12556:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12588:Username : aduser1&lt;BR /&gt;12589:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12610:Username : Administrator;aduser1&lt;BR /&gt;12611:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12640:Username : aduser1&lt;BR /&gt;12641:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12673:Username : aduser1&lt;BR /&gt;12674:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12702:Username : Administrator;aduser1&lt;BR /&gt;12703:Log Username : ADUser1 (aduser1)&lt;BR /&gt;12921:Username : aduser1&lt;BR /&gt;12922:Log Username : ADUser1 (aduser1)&lt;BR /&gt;14810:Username : aduser1&lt;BR /&gt;14811:Log Username : ADUser1 (aduser1)&lt;BR /&gt;14840:Username : Administrator;aduser1&lt;BR /&gt;14841:Log Username : ADUser1 (aduser1)&lt;BR /&gt;14996:Username : Administrator;aduser1&lt;BR /&gt;14997:Log Username : ADUser1 (aduser1)&lt;BR /&gt;15019:Username : aduser1&lt;BR /&gt;15020:Log Username : ADUser1 (aduser1)&lt;BR /&gt;17212:user: aduser1&lt;BR /&gt;17222:Username : aduser2;aduser1;Administrator&lt;BR /&gt;17223:Log Username : ADUser1 (aduser1)&lt;BR /&gt;17484:Username : aduser1;Administrator&lt;BR /&gt;17485:Log Username : ADUser1 (aduser1)&lt;BR /&gt;116078:user: aduser1&lt;BR /&gt;116088:Username : aduser1&lt;BR /&gt;116089:Log Username : ADUser1 (aduser1)&lt;BR /&gt;283239: Account Name: aduser1&lt;BR /&gt;283396: Account Name: aduser1&lt;BR /&gt;283458:$$START$$ nt_log_event: aduser1 $$END$$&lt;BR /&gt;283461:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_DCOM (TD::All)] ADLOG::DcomWmiLogicLayer::analyze: analyzing data: nt_log_event: aduser1&lt;BR /&gt;283541:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: Username = aduser1&lt;BR /&gt;283544:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: InsertionStrings[0] = aduser1&lt;BR /&gt;283602:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Full field text (aduser1)&lt;BR /&gt;283604:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::EventFieldSettings::processField: Field extracted value: (aduser1)&lt;BR /&gt;283606:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Field extracted value (aduser1)&lt;BR /&gt;283614:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) and value (aduser1)&lt;BR /&gt;283615:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) pattern (][\/":|&amp;lt;&amp;gt;+=;,?*@) on value (aduser1)&lt;BR /&gt;&lt;SPAN&gt;283687: Account Name: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;283826: Account Name: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;283893:$$START$$ nt_log_event: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;SPAN&gt; $$END$$&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;283896:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_DCOM (TD::All)] ADLOG::DcomWmiLogicLayer::analyze: analyzing data: nt_log_event: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;283961:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: Username = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;283964:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: InsertionStrings[0] = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;284019:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Full field text (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;BR /&gt;284021:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::EventFieldSettings::processField: Field extracted value: (aduser1)&lt;BR /&gt;284023:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Field extracted value (aduser1)&lt;BR /&gt;284031:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) and value (aduser1)&lt;BR /&gt;284032:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) pattern (][\/":|&amp;lt;&amp;gt;+=;,?*@) on value (aduser1)&lt;BR /&gt;&lt;SPAN&gt;284104: Account Name: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;284243: Account Name: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;284302:$$START$$ nt_log_event: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;SPAN&gt; $$END$$&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;284305:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_DCOM (TD::All)] ADLOG::DcomWmiLogicLayer::analyze: analyzing data: nt_log_event: &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;284370:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: Username = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;284373:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: InsertionStrings[0] = &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;284428:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Full field text (&lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:aduser1@HIGHERINTELLIGENCE.COM"&gt;aduser1@HIGHERINTELLIGENCE.COM&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;BR /&gt;284430:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::EventFieldSettings::processField: Field extracted value: (aduser1)&lt;BR /&gt;284432:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Field extracted value (aduser1)&lt;BR /&gt;284440:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) and value (aduser1)&lt;BR /&gt;284441:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) pattern (][\/":|&amp;lt;&amp;gt;+=;,?*@) on value (aduser1)&lt;BR /&gt;284603: Account Name: aduser1&lt;BR /&gt;284869: Account Name: aduser1&lt;BR /&gt;284971:$$START$$ nt_log_event: aduser1 $$END$$&lt;BR /&gt;284974:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_DCOM (TD::All)] ADLOG::DcomWmiLogicLayer::analyze: analyzing data: nt_log_event: aduser1&lt;BR /&gt;285102:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: InsertionStrings[5] = aduser1&lt;BR /&gt;285160:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Full field text (aduser1)&lt;BR /&gt;285162:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::EventFieldSettings::processField: Field extracted value: (aduser1)&lt;BR /&gt;285164:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Field extracted value (aduser1)&lt;BR /&gt;285170:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) and value (aduser1)&lt;BR /&gt;285171:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) pattern (][\/":|&amp;lt;&amp;gt;+=;,?*@) on value (aduser1)&lt;BR /&gt;286065: Account Name: aduser1&lt;BR /&gt;286330: Account Name: aduser1&lt;BR /&gt;286432:$$START$$ nt_log_event: aduser1 $$END$$&lt;BR /&gt;286435:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_DCOM (TD::All)] ADLOG::DcomWmiLogicLayer::analyze: analyzing data: nt_log_event: aduser1&lt;BR /&gt;286563:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG (TD::Events)] ADLOG::NtEventLogEntry::NtEventLogEntry: InsertionStrings[5] = aduser1&lt;BR /&gt;286621:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Full field text (aduser1)&lt;BR /&gt;286623:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::EventFieldSettings::processField: Field extracted value: (aduser1)&lt;BR /&gt;286625:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventParser::processEvent: Field extracted value (aduser1)&lt;BR /&gt;286631:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) and value (aduser1)&lt;BR /&gt;286632:[6490 3967998864]@GW8010[28 Dec 19:40:57] [ADLOG_EVENT_PROCESS (TD::Events)] ADLOG::EventValidator::validateField: Validaing field (username) pattern (][\/":|&amp;lt;&amp;gt;+=;,?*@) on value (aduser1)&lt;BR /&gt;[Expert@GW8010:0]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the only event attributed to IA blade is:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="76609" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76609_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This lab is build under NFR for partner with no active support contract, so I cannot open SR on it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Dec 2018 00:52:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16072#M2678</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-12-29T00:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16073#M2679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/48025"&gt;Vladimir Yakovlev&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;it seems that the user is received&amp;nbsp;on the PDP gateway.&lt;/P&gt;&lt;P&gt;The next phase in the user processing is&amp;nbsp;to perform LDAP query to get additional attributes from the AD.&lt;/P&gt;&lt;P&gt;please run the following debug flag:&lt;/P&gt;&lt;P&gt;# pdp&amp;nbsp;d s AUTH all&lt;/P&gt;&lt;P&gt;to disable:&lt;/P&gt;&lt;P&gt;# pdp d u AUTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please grep for "AUTH" in pdp debug and look for the query where we are asking for&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;aduser1 information.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Royi.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2019 07:04:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16073#M2679</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2019-01-07T07:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16074#M2680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/46230"&gt;Royi Priov&lt;/A&gt;‌, there are no results with "AUTH" in debug output.&lt;/P&gt;&lt;P&gt;See attached pdpd.elg for details.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2019 00:18:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16074#M2680</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-01-23T00:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness getting DC Name only</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16075#M2681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/48025"&gt;Vladimir Yakovlev&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The debug contains only "TRACKER" logs, which is the default topic.&lt;/P&gt;&lt;P&gt;make sure you are running the debugging procedure&amp;nbsp;as I wrote - you can verify the current debug running topics with "pdp d stat".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as I wrote above - this should be handled with an SR with TAC, as it seems that we need to troubleshoot this to understand why this happens in your environment. Our support will be happy to assist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Royi.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Feb 2019 08:28:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-Awareness-getting-DC-Name-only/m-p/16075#M2681</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2019-02-03T08:28:44Z</dc:date>
    </item>
  </channel>
</rss>

