- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hey,
First, blur your LogServerOrigin - if it matters or not.
Now, do you get the error on the "Failed Log In" or on any identity records ?!?!?!?!
We had that in the past, and all we did was to drop the SSL HASH from the LDAP objects.
That happened because AD Team changed certificates on their servers... so it will fail since the fingerprint/hash doesn't match anymore .
(see the sk156853 and you will get it, JUST!!!!! leave the Fingerprint empty !!!!! )
This is how an "Failed Log In" looks for us - as you can see the machine was identified properly in AD and mapped to AD groups.
PS:
See this (Check-Point-LDAPS-connection-breaks-everytime-AD-certificate-is) and others similar - just search LDAPs in the CheckMates Forum.
What about this error message from the windows event log :
The server-side authentication level policy does not allow the user AAAAAA SID (S-1-5-21-000000000000) from address XX.XX.XX.XX to activate DCOM server. Please raise the activation authentication level at least to RPC_C_AUTHN_LEVEL_PKT_INTEGRITY in client application.
The above belongs to Management server trying to access the domain controller.
There are a ton of writings out-there in regards to the error you presented.
Seems more like an AD issue or account rights or a protocol change in the communication - didn't dig up too much.
Tnx,
PS: have you cleared the AD server SSL HASH from the LDAP objects ?
no not yet i will have to raise a TAC.
Is that required for a change in your environment, or you referred to TAC as CheckPoint TAC ?
You see in your logs some AD group retrieval errors and like we've seen it in the past, one of the problems was the fact that the SSL certificate was changed on AD servers, was changed.
In order to overcome that, all you have to do is to drop the Fingerprint from the LDAP objects, so they will not fail if the SSL cert changes in the future.
Thank you,
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY