- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026
Inception is On!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello experts,
I am running R81 with blade Identity Awareness.
I enabled this blade , and connect successfully to LDAP server. Then I create access-role (get user from LDAP), and put it in the policy rule like this:
But when I log in into PC with above account (hai2), then I access to some-where. In the logview, (colum Source User Name) it does not show anything about my access-role
Please help me; thank all!
Two things spring to mind:
1. Can you confirm that the users are actually matching the policy you created
2. Make sure "hide user identities" is not enabled in SmartView
Hi Ruan,
Yes, I confirm I use exactly user name (which put in rule) to login PC (192.168.1.100).
"hide user identities" => I haven't known where it is, but when I show pdp like this : It said that no information found!
[Expert]# pdp monitor ip 192.168.1.100 ==>(IP of PC I use above)
no information was found for 192.168.1.100
I dont know why
Apologies for responding for old thread, but I have same issue with a customer. I have no clue what to even look for, as IA blade is configured properly, all the settings were verified, but we are totally puzzled as to why "source user name" does not show anything.
I suggest checking if the Successful Logon events are being logged on domain controllers. i think those are event numbers 4624.
Its Azure AD, so not 100% certain how it works on that end : - (
Have you seen this post:
https://community.checkpoint.com/t5/Security-Gateways/Identity-Awareness-using-Azure-AD/td-p/84940
We have call with CP on this soon, so lets hope we fix it, will update : - )
Hi,
do you have some news about that?
Please let me know, because I have this kind of problem with a customer firewall.
Thank you!
Hi bro,
I re-install blade Indentity Awareness, and select account which have domain admin right, then it works. Good luck.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 21 | |
| 8 | |
| 7 | |
| 7 | |
| 5 | |
| 4 | |
| 3 | |
| 2 | |
| 2 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY