- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello guys
AD Query has this limitation:
Many user accounts connected from the same IP address - AD Query cannot detect when a user logs out. Therefore, more than one user can have open sessions from the same IP address. When this occurs, the permissions for each account stay active until their User/IP association timeout occurs. In this scenario, there is a risk that currently connected users can get access to network resources, for which they do not have permissions.
Does Identity Collector share this limitation? If not, how does it solve this?
IDC also has the same limitation, stemming from the same place - there's no 'log out' event in AD for us to read. To know when a session has ended, we need to be reading from an agent on the machine, either the multi-user host agent on terminal servers or the regular agent on PCs.
This can be mitigated on single-user PCs by enabling the 'assume one user per host' option that will end the user association to an IP address when a new user is associated with it.
I see this option.
I have this option on both Security Gateway and Security Management Server, what are the differences?
Not sure if you meant to add a screenshot or something there, which option are you referring to?
See if below discussion helps, lots of things were discussed here.
Andy
https://community.checkpoint.com/t5/Security-Gateways/New-IA-Implementation/m-p/185851#M34184
In general there are certain scenarios that can only be solved entirely with the Identity Agent, with that said Identity Collector is preferred over the legacy ADquery method for several reasons.
To add, here are the pro's of the IDC:
Reduced load on the Security Gateway - Identity Collector does the queries instead of the Security Gateway
Reduced load on the Domain Controller (DC) - the native Windows API consumes fewer resources
Lower permissions required - Identity Collector requires read-only access to the domain security logs
No changes are required in the Active Directory (AD) schema.
One Identity Collector can serve multiple Security Gateways, even from a different Domain Management Servers on a Multi-Domain Server
Identity Collector can communicate with a maximum of up to 35 Active Directory (AD) servers.
Identity Collector can process a maximum of 1900 Active Directory (AD) events per second.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 20 | |
| 19 | |
| 19 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY