Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Vladimir
Champion
Champion

Identity awareness logging only logon and logoff events.

Now, this may sound funny to some of you that know me, but here it is:

We are running Security Checkup in our environment and the 15400 all-in-one box that was configured to accept the traffic from the span port, blades enabled and IA configured.

IA is working in terms of seeing AD objects when trying to define roles and we see the logon and logoff events in a SmartLog.

AD query is working with adlog a dc and adlog a q ip returning proper values.

There are, however no user or machine IDs int the rest of the logs.

I am not involved in the hands-on aspects of this project due to rather dramatically expanded responsibilities in my current role, but would like to lend a hand to my guys that are involved with it.

SE that Check Point assigned to the case stated that he has seen this behavior in one more Security Checkup he was running, but that the root cause was never determined.

Another question is this: when running security checkup with all-in-one, does it make sense to have IA configured or is it better to have Identity Logging configured on the box. Is there a case where both should be configured?

 

Let me know if you have any suggestions.

Thank you,

Vladimir

0 Kudos
8 Replies
Kaspars_Zibarts
Employee Employee
Employee

Didn't you ask this already earlier and I got Royi in the thread? 😎 We use IDC and never seen this behaviour I'm afraid. TAC case it is
0 Kudos
Vladimir
Champion
Champion

Nope, that last case was a lab build with multiple components.

This is at my work, where I am not involved with the hands-on operations (yeah, the irony not lost on me 🙂 ).

As it is a Security Checkup in a PAN shop, I can't even open SR for it, so it is up to the VAR and SE assigned to the project.

 

0 Kudos
Royi_Priov
Employee
Employee

Hi @Vladimir !

 

I will explain about how the logging mechanism works, and it might help you with pin pointing the problem.

Indeed the Identity Awareness DB resides on PDP process (where you are typing "pdp monitor..." you see the relevant output).

However, logging mechanism is owned by PEP. It means:

1. Identity sharing is needed in case PDP and PEP are different GWs.

2. The relevant CLI  to check the data on the GW is:

# pep show user query cid <IP>

 

As for Identity Logging, I less prefer this option. It uses the same mechanism of AD query, and require high permissions for the configured admin, and uses WMI. I will recommend using Identity Collector instead.

 

HTH,

Royi Priov.

Thanks,
Royi Priov
Group manager, Identity Awareness R&D
0 Kudos
Vladimir
Champion
Champion

@Royi_Priov , thank you, I'll try and see if the # pep show user query cid <IP> will return accurate information.

As to Identity Collector, it is still requires LDAP Account Units.:

2019-12-02 08_27_03-Identity_Collector_Identity Awareness Administration Guide R80.30.png

It looks like you have to use LDAP Account unit for authentication, which requires either Domain Admin account or the one described in sk93938 :

2019-12-02 08_29_38-LDAP_Accout_Units_Security Management R80.30 Administration Guide.png

Which gets as back to the AD Query.

Apologies if I am slow to pick this up, but every time I am looking into Identity Collector, I feel like a dog  chasing chasing his own tail 🙂

Let me know if, when we are using Identity Collector, a different Account Unit usage parameter should be selected.

Thank you,

Vladimir

 

0 Kudos
Royi_Priov
Employee
Employee

LDAP AU is needed for most of the identity sources. Why? because Identity Source provides {user, machine, IP} to the PDP.

However, we are missing the identity groups, which most customers are using for identity based enforcement.

In other words - both AD Query and Identity Collector will provide to PDP only {user, machine, IP} - AD Query will do it with WMI, while IDC will do it with Microsoft API. In both cases, PDP will query the AD (with LDAP) for the identity groups (user groups, machine groups). After this query, the information will be {user, machine, IP, groups} and PDP will be able to calculate the needed access roles for enforcement.

On the other hand, since Identity Logging is not related to enforcement, no LDAP query will be executed for identity groups.

 

I hope it makes things clear. If not, tag me again 🙂

 

Royi Priov.

 

 

Thanks,
Royi Priov
Group manager, Identity Awareness R&D
FedericoMeiners
Advisor

It's been a while since I performed a security checkup, but in my mind I always turned on identity logging only since is what you really want: Users on the report. IA is only to create rules based on identity.

Identity Collector would be a nice option but in most checkups the customer doesn't like to deploy a server for it's purpose.

On large scale checkups try to disable as much system accounts as possible to avoid loss of information.

____________
https://www.linkedin.com/in/federicomeiners/
Vladimir
Champion
Champion

Thank you for the suggestion. Can you expand on this: "disable as much system accounts as possible"?
0 Kudos
Royi_Priov
Employee
Employee

Please refer to sk113833

Thanks,
Royi Priov
Group manager, Identity Awareness R&D
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events