- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
I'd ask for help/advise for the issue with Identity awareness.
I have Checkpoint 3600 R80.40 Take 309 managed by SMC 80.40
I've enabled the IA blade and configured settings/rules.
I've created the rule with single user to be permitted Destination/Service - any.
All networks and machines allowed.
While testing I can see the test user successfully identified with AD name but the rule is not matching.
I've recreated the rule - still not working.
Kind regards,
Paul
Hi Paul, would you mind send us the screenshot of the rule and also tell us what other rule is being matched? Is it possible you have a rule above IA rule that could be catching the traffic?
Not sure in that case, may need more testing, maybe contact TAC and see if they can do remote session. Personally, I would just make sure user is included in right access role group and maybe do tcpdump and/or fw monitor as well to test traffic.
Also, maybe run some pdp commands to see the state:
adlog a dc
pdp monitor ip x.x.x.x
pdp monitor user xxxxx
Hope that helps.
Thank you for sharing useful commands.
AD queries are working fine.
I've raised a TAC.
Hopefully support can fix it.
Check out the Multi User Host detection:
https://community.checkpoint.com/t5/Security-Gateways/Identity-Awareness-Multi-User-Host/m-p/80173/h...
Maybe service accounts login cause the source host to be marked as "multi user host", you can check with "pdp muh status"
It doesn't look like your user has assumed the defined role. You can check from logs by running filter
blade:"Identity Awareness" AND action:"Log In" AND src:x.x.x.x
change x.x.x.x to users IP of course
then you should see what roles are associated with this IP:
Thats actually an EXCELLENT point! I totally forgot about it, but I agree that if thats wrong, the rule would not work.
Thank you for the advice.
That's interesting!
I've found the logs with failed login and error:
"Failed to get users groups for the domain.
Verify that this domain name is configured in your LDAP Account Unit."
Looks like I've chosen the wrong domain.
I'll check the settings an let you know.
Please let us know if you can correct that, I am 99% sure that is the issue. Big thanks to @Kaspars_Zibarts for pointing that out!!
Hello,
Have you solve this issue, we have the same issue
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY