<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best Practices for Identity Collector Architecture in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19409#M3590</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'd think Identity Collector would be mentioned here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk88520" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk88520"&gt;Best Practices - Identity Awareness Large Scale Deployment&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I submitted some feedback in the above SK.&lt;/P&gt;&lt;P&gt;Hopefully this is something we can address in the near future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Dec 2017 00:08:45 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-12-20T00:08:45Z</dc:date>
    <item>
      <title>Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19407#M3588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a "best practices" doc available that gives coverage of proper IDC architecture, specifically in VSX environment with multiple VS running IDA? Should IDC agents be configured with each IDA enabled VS as a gateway (IDC agent side)? Should only VS0 run IDA and share out the database to each VS? I'm having a difficult time finding the best way to implement this IDC on VSX in regard to reliability first, redundancy second, and performance third.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Josh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Sep 2017 23:23:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19407#M3588</guid>
      <dc:creator>Josh_Wilson</dc:creator>
      <dc:date>2017-09-01T23:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19408#M3589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been waiting for an IDC best practices document since it was in EA.&amp;nbsp;&amp;nbsp; Someday...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Sep 2017 14:00:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19408#M3589</guid>
      <dc:creator>Quinn_Yost</dc:creator>
      <dc:date>2017-09-05T14:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19409#M3590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'd think Identity Collector would be mentioned here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk88520" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk88520"&gt;Best Practices - Identity Awareness Large Scale Deployment&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I submitted some feedback in the above SK.&lt;/P&gt;&lt;P&gt;Hopefully this is something we can address in the near future.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2017 00:08:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19409#M3590</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-12-20T00:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19410#M3591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;6 months later, no sign of IDC in the SK: Best Practices - Identity Awareness Large Scale Deployment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do we have any thoughts on when the SK may be updated?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jun 2018 19:01:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19410#M3591</guid>
      <dc:creator>Matt_Taber</dc:creator>
      <dc:date>2018-06-07T19:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19411#M3592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sk88520 covers Identity Collector as well. Essentially IDC should be treated as any other identity source, one (or more) PDP should be defined and the rest of the enforcement points should get the information using identity sharing.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 15:21:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/19411#M3592</guid>
      <dc:creator>Tzvi_Katz</dc:creator>
      <dc:date>2018-08-14T15:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52323#M10358</link>
      <description>&lt;P&gt;Is there any limitations with the # of IA collectors and sharing across gateways?&lt;/P&gt;&lt;P&gt;We have a rollout at my company where 9 of the 10 clusters have local AD servers.&amp;nbsp; &amp;nbsp; Our windows team had concerns with AD load and hence why we went with IA collectors verse AD Query.&lt;/P&gt;&lt;P&gt;In order to be as redundant as possible, we attempted the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Each of the 9 sites have 2 local IA collectors connected to its local AD servers only&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Each of the 9 sites shares (or attempts to) with the other locations&lt;/LI&gt;&lt;LI&gt;The 10th site has no AD servers locally so it connects to one of our datacenter's IA collectors (both IA servers).&lt;/LI&gt;&lt;LI&gt;The 10th site accepts shares from other gateways but does not share themselves&lt;UL&gt;&lt;LI&gt;Since its collecting from the same IA as the DataCenter GW, that DC GW is already sharing.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What we are getting is a whole mix of users that seem to collect fine locally but simply do not share across all other GWs.&lt;/P&gt;&lt;P&gt;Notes:&lt;/P&gt;&lt;P&gt;2 locations run clustered 13500 appliances&lt;/P&gt;&lt;P&gt;6 locations are 4800 clustered appliances&lt;/P&gt;&lt;P&gt;1 location (the one with no AD servers) is a 5800 cluster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When looking that the "best practices' docs for IA, it doesn't seem clear to me on what method would be best for reduced load, efficiency and most importantly....redundancy.&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Has anyone had similar issues with this type of rollout?&amp;nbsp;&amp;nbsp;&lt;UL&gt;&lt;LI&gt;What did you do to get it to work?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;What are the # of redundant IA collectors you can deploy to one gateway?&lt;UL&gt;&lt;LI&gt;Can you do more than 2?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;What is less on resource load and bandwidth:&amp;nbsp; &amp;nbsp;&lt;UL&gt;&lt;LI&gt;Deploying 2 (or more )IA collectors in 2 different DCs (redundancy) that collect logs from EVERY AD server across the enterprise; have every GW collect from these IA servers and do not share identities&lt;/LI&gt;&lt;LI&gt;Deploying 2 (or more )IA collectors in 2 different DCs (redundancy) that collect logs from EVERY AD server across the enterprise; have only the DC GWs connect to the IA collectors and share identities with all other GWs&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;In this event, would I need to deny sharing between the DCs since they are collecting the same logs?&lt;/LI&gt;&lt;LI&gt;Is there any issue with the remote GWs since they would see the same sharing info from both DC GWs?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 May 2019 17:17:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52323#M10358</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-05-01T17:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52332#M10359</link>
      <description>Additional info:&lt;BR /&gt;Management server: R80.20 JHF take 47&lt;BR /&gt;GW: All are R80.10 JHF take 189</description>
      <pubDate>Wed, 01 May 2019 18:18:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52332#M10359</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-05-01T18:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52361#M10365</link>
      <description>&lt;P&gt;I too would like to get better understanding of IA in general and IDC use cases in particular.&lt;/P&gt;
&lt;P&gt;It does not look like we can use IDC for Identity Logging, which still relies on the high privilege account with AD query.&lt;/P&gt;
&lt;P&gt;Would be nice to remove AD Account Units from the picture and rely on IDCs for that as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 00:27:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52361#M10365</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-05-02T00:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52479#M10392</link>
      <description>&lt;P&gt;There are 2 problems with Identity Sharing:&lt;/P&gt;&lt;P&gt;1. Identity Sharing via VPN can cause IPSec Replay Attacks by clusters standby member&lt;/P&gt;&lt;P&gt;2. Identity Sharing between gateways managed by different domains of a MDM is a pain&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's why if only IDC is involved, I tend to configure each gateway to receive the events individually.&lt;/P&gt;&lt;P&gt;But with other identity sources like TSagent, RemoteAccess this is not possible, as they are not shared then.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2019 06:17:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52479#M10392</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-05-03T06:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52932#M10547</link>
      <description>Norbert,&lt;BR /&gt;&lt;BR /&gt;Luckly, neither of the 2 problems you have defined would affect us. I ended up changing the topology last night for 2 clusters (2 separate data centers) connected to the same IDCs (one in each DC) and then sharing with the other gateways.&lt;BR /&gt;&lt;BR /&gt;Looks ok so far but will need to test further as old user sessions start to age out.&lt;BR /&gt;&lt;BR /&gt;I was thinking of having each GW just all connect to the same 2 IDCs but I know that a terminal agent for citrix is in our future and i might have to use the user agents for our MAC OS clients here.&lt;BR /&gt;&lt;BR /&gt;Captive portal is something we wanted to avoid since we already have one for forcepoint in play today.</description>
      <pubDate>Wed, 08 May 2019 17:20:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/52932#M10547</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-05-08T17:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/54752#M10941</link>
      <description>&lt;P&gt;Quick update:&lt;/P&gt;&lt;P&gt;The IA collectors at 2 DCs and then sharing to other gateways has been working great!&amp;nbsp; &amp;nbsp; We gotten a few access roles deployed and so far its working as we imagined.&lt;/P&gt;&lt;P&gt;For the MAC issue, this is really due to MAC OS.&amp;nbsp; &amp;nbsp; &amp;nbsp;With any MAC OSX joined to AD, the MAC is not 'site aware' and therefore we were getting auths sent to DCs that we were 1) not monitoring with the collector and 2) really didn't want them going randomly cross site.&lt;/P&gt;&lt;P&gt;The temp fix was to set a prefered AD server in the Active Directory config on the MAC.&amp;nbsp; &amp;nbsp;That has consistantly gotten the login but have to sometimes 'force' the update with "kinit" via terminal.&lt;/P&gt;&lt;P&gt;Long term (outside of using the machine agent from Checkpoint), we have been testing NOMAD with the MACs.&amp;nbsp; &amp;nbsp;NOMAD is site aware and our initial testing gets the MAC as close to windows in regards to AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One item did come up that caught us offguard:&amp;nbsp; &amp;nbsp;2 of DCs we are collecting from stopped connecting.&amp;nbsp; &amp;nbsp;Its for a sister company of ours and think something changes on a config or patch.&amp;nbsp; &amp;nbsp; Regardless, my question is:&amp;nbsp; &amp;nbsp;how do you monitor this type of event on the Identity Collector itself?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've seen post on custom querries to the gateways to detect when they stop getting feeds from the collector itself.&amp;nbsp; &amp;nbsp;I've also seen the updated SK (&lt;SPAN&gt;sk108235) on the monitoring capabilities via SNMP to R80.20 gateways for the collector status.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I simply can't find in any searches or admin guides on how to monitor issues on the IA collector itself in regards to its "identity sources" status.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Does anyone know how to detect such an event?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Lastly, during my search, I see that there is a newer collector out (sk134312).&amp;nbsp; &amp;nbsp;We are currently running&amp;nbsp;80.72.0000&amp;nbsp; and I'd like to plan to upgrade it......but can't seem to find any docs on how to upgrade &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Plenty on install but nothing on upgrading a existing collector.&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Do you export the config, delete the agent and reinstall?&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Any changes needed to resynch with the gateways, its identity sources, etc?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Does it support a direct upgrade when running the new MSI package?&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Does the configs stay in a 'in place' upgrade?&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2019 17:42:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/54752#M10941</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-05-30T17:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/58510#M11788</link>
      <description>&lt;P&gt;Anyone have any advise or reference documentation on how to upgrade an existing IA Collector MSI?&lt;/P&gt;&lt;P&gt;I still can't find any notes on checkmates or within support center.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 18:36:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/58510#M11788</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-07-18T18:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59185#M11931</link>
      <description>&lt;P&gt;Anyone have info on upgrading the Identity Collector agents?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 16:34:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59185#M11931</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-07-29T16:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59301#M11969</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/23295"&gt;@Scott_Chambers&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Identity Collector has a monitoring feature, which reflects the "Identity Sources" tab on the IDC to the GW.&lt;/P&gt;
&lt;P&gt;As you have mentioned, it will allow you to monitor changes with sources which are disconnected.&lt;/P&gt;
&lt;P&gt;There are 3 main ways to get this data:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;"c&lt;EM&gt;pstat identityServer -f idc" &lt;/EM&gt;command on the GW&lt;/LI&gt;
&lt;LI&gt;add SNMP query for the relevant OIDs (can be found in&amp;nbsp; $FWDIR/conf/identity_server.cps).&lt;/LI&gt;
&lt;LI&gt;in R80.30, we have also added "pdp idc status" command to see the output.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;all is mentioned in&amp;nbsp;sk108235, including the steps needed to enable this feature.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for installation, you can run in-place installation, which will overwrite the application files while saving your config.&lt;/P&gt;
&lt;P&gt;I do suggest saving an "export" via the IDC before running the upgrade, just to be on the safe side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If any other questions are raised, please tag me and I will take a look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Royi Priov - Identity Awareness R&amp;amp;D.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 05:48:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59301#M11969</guid>
      <dc:creator>Royi_Priov</dc:creator>
      <dc:date>2019-07-31T05:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59740#M12075</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the response.&amp;nbsp; &amp;nbsp; Glad to hear that the upgrade of the agents are that simple &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'll be upgrading ours tomorrow and will provide feedback.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In regards to the monitoring, I see the SK regarding the GW to IA collector via CLI or SNMP (R80.20 GW and up).&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I haven't been able to find is additional monitoring on the IA collector itself (or its server its installed on).&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;We had a situation a few weeks back with a partner company and they 'accidentally' set our AD service account for the collector to expire.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outside of event monitoring of this account expiring in SmartConsole, is there a way to alert on the IA collector itself when it can no longer fetch accounts/security events from a select AD server?&amp;nbsp; &amp;nbsp; The next time might not be an account expire but a permission or server related that would not generate such log.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have 32 connected to our IA collectors and this issue affected access to 5 of them.&amp;nbsp; &amp;nbsp;I would be nice to have alerting from the collector end when such events occur.&lt;/P&gt;&lt;P&gt;While the enhanced monitoring you've mentioned can catch when the IA collector disconnects or has not sent events in the last 'x' hours, an alert from the collector against the AD servers it fetches security events from would be beneficial &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Its very rare for us not to see an event from a AD server so an alert where we don't get an event from a select AD server in 1 hour (for example) would greatly help as we scale out IA across our enterprise.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 17:12:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59740#M12075</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-08-06T17:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59743#M12077</link>
      <description>The monitoring on the gateway gets information of events sent for each domain controller. So you can monitor the events and alert if they drop near zero!</description>
      <pubDate>Tue, 06 Aug 2019 18:24:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59743#M12077</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-08-06T18:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59745#M12078</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1433"&gt;@Norbert_Bohusch&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that true in a IA collector configuration only?&lt;/P&gt;&lt;P&gt;There is no AD Query, API, Terminal/User agents, etc.....just IA collectors and gateway sharing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have collectors connected to 2 gateways and the rest is pure IA sharing from those 2.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is the IA Collector gets the security events from the AD servers and its that connection I would like to monitor.&amp;nbsp; &amp;nbsp; If there are events that I would see in SmartLog/Event in this type of setup, can you provide a few examples?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If its just building out some alert rules for logs that are currently (or can be) sent, I can do that &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 18:50:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59745#M12078</guid>
      <dc:creator>Scott_Chambers</dc:creator>
      <dc:date>2019-08-06T18:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59779#M12092</link>
      <description>&lt;P&gt;This monitoring is only for IDC (identity collector), yes.&lt;/P&gt;&lt;P&gt;So if you have a look at the gateway with the following (output from my lab):&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;[Expert@nb-ckp-gw1:0]# cpstat identityServer -f idc&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Identity Collector Sources&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;--------------------------------------------------------------------------------------------&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;|Type|Name |Host |Status |IDC IP |Events Recieved|Total Events|&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;--------------------------------------------------------------------------------------------&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;|AD |nb-win-ad.nb.lab.local|10.2.231.60|Connected|10.2.231.61| 10| 61351|&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;--------------------------------------------------------------------------------------------&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;You see one line for each domain controller and it shows "Events Received".&lt;/P&gt;&lt;P&gt;This is exact the same information you can query via SNMP:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;[Expert@nb-ckp-gw1:0]# snmpwalk -v 2c -c public 127.0.0.1 1.3.6.1.4.1.2620.1.38&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.1.0 = STRING: "Identity Awareness"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.2.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.3.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.4.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.5.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.6.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.7.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.8.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.9.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.10.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.11.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.12.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.13.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.14.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.15.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.16.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.17.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.18.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.19.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.20.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.21.0 = Gauge32: 11&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.22.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.23.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.24.1.1.1.0 = Gauge32: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.24.1.2.1.0 = STRING: "nb-ckp-gw"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.24.1.3.1.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.24.1.4.1.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.24.1.5.1.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.24.1.6.1.0 = Gauge32: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.26.0 = Gauge32: 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.27.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.28.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.29.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.30.0 = Gauge32: 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.31.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.32.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.33.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.34.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.35.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.36.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.37.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.38.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.39.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.40.0 = Gauge32: 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.41.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.42.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.43.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.44.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.45.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.46.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.47.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.48.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.49.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.50.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.51.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.52.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.1.1.0 = Gauge32: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.2.1.0 = STRING: "AD"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.3.1.0 = STRING: "nb-win-ad.nb.lab.local"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.4.1.0 = STRING: "10.2.231.60"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.5.1.0 = Gauge32: 3&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.6.1.0 = STRING: "Connected"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.7.1.0 = STRING: "10.2.231.61"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.53.1.8.1.0 = Gauge32: 61366&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.101.0 = Gauge32: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.102.0 = STRING: "OK"&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;SNMPv2-SMI::enterprises.2620.1.38.103.0 = STRING: "OK"&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;So if you query the value of "events received and see an abnormal low value for one or more AD servers, your monitoring can trigger an alert.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;Then you know you don't receive events from a specific AD server or set of AD servers and can investigate, what exactly is broken.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 06:29:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/59779#M12092</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-08-07T06:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/60870#M12343</link>
      <description>Hello Norbert,&lt;BR /&gt;&lt;BR /&gt;what is a little bit downside is that currently PDP gateway is able to monitor only one IDC.&lt;BR /&gt;we have 2 IDC connected to PDP for redundancy and only one is visible when "cpstat identityServer -f idc" or SNMP query is sent to the gateway.&lt;BR /&gt;when "pdp con idc" is run I can see two IDC with valid shared secret status delivering events to the gateway&lt;BR /&gt;&lt;BR /&gt;or am I doing something wrong here please?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Juraj&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Aug 2019 13:08:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/60870#M12343</guid>
      <dc:creator>Juraj_Skalny</dc:creator>
      <dc:date>2019-08-21T13:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Best Practices for Identity Collector Architecture</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/60877#M12347</link>
      <description>&lt;P&gt;found it!&lt;/P&gt;&lt;P&gt;there must be MonitoringEnabled registry created on both IDC&lt;/P&gt;&lt;P&gt;Then they bot appear when "&lt;EM&gt;pstat identityServer -f idc"&amp;nbsp; &lt;/EM&gt;is runor SNMP query is sent to PDP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;registry print screen should be in attachment&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 21 Aug 2019 14:15:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Best-Practices-for-Identity-Collector-Architecture/m-p/60877#M12347</guid>
      <dc:creator>Juraj_Skalny</dc:creator>
      <dc:date>2019-08-21T14:15:02Z</dc:date>
    </item>
  </channel>
</rss>

