- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
So i'm preparing to move from AD query to Identity Collector.
Installed the software on 2 domain controllers for redundancy.
All working fine for the domain controller on which the software is installed, but the other one is not.
"Unable to connect, please check connectivity ....."
Actually, i added our 4 DC as identity sources but only planning to install IC on 2 of them since this is enough for redundancy purpose.
Are you supposed to only add the DC where Identity Collector has been installed on, as identity source?
Got it figured out 🙂
The issue was Windows Firewall blocking dynamic ports communication between DCs, once we opened that up, everything became green and connected.
Advice to Checkpoint: please add this in the documentation of Identity Collector as a note (Windows Firewall rule which needs to allow incoming DCOM ports communication between DCs) so people don't have to loose too much time troubleshooting this.
You should be able to add all of them actually. Did you check connectivity with other 3?
Andy
They are all in the same subnet so i would assume this would have been a no brainer. Seems not 😊
So on one DC, let's say DC4 in my case, i should be able to see events from all 4 DC, that's what you are saying?
Then i'm asking myself what is blocking this.....
Agree, specially if its same subnet : - ). How did you add them? Manually or option "fetch automatically"?
"fetch automatically" is how i added them
If i double click on the identity source where IC is installed, it passes the test and connection is fine.
If i double click on any other identity source where IC is not installed on, it fails the test with the message "unable to connect, please check"
Let me confirm with client we did this for, as they also have 4 DCs I believe and all shows fine, but IC is only installed on one of them.
This is what customer told me as the answer to my question if he remembered if we did automatic or manual...
"I can’t recall but I think it found all of them. I know it pulled the wrong info (site name) and I had to manually enter that."
Got it figured out 🙂
The issue was Windows Firewall blocking dynamic ports communication between DCs, once we opened that up, everything became green and connected.
Advice to Checkpoint: please add this in the documentation of Identity Collector as a note (Windows Firewall rule which needs to allow incoming DCOM ports communication between DCs) so people don't have to loose too much time troubleshooting this.
Thanks for sharing the solution, @Dave
Good old Windows : - ). Thanks a lot for letting us know, it will help others, for sure!!
Unfortunately, the story doesn't end here because another issue popped up.
So i had foreseen to run identity collector as a service under another service account, freshly created and with the domain user permissions, user is part of group 'Event Log Readers' group.
As soon as i run cpidc.exe as a service and under this new service account, everything stops working, all identity sources are yellow and no identities are collected anymore.
When i remove the service account and let the service run under my domain admin account, everthing changes instantly to green again and identities are collected.
This for sure has to do with user rights in Windows, but it seems like having a domain user with group membership of 'Event Log Readers' group is not enough?
Please help me understand what i'm missing 🙂
Most probably the permissions mismatch. If you looked through sk108235 and sk179544 and did not find the trigger for the issue, I would advise engaging with TAC to drill down.
Yes permission issue most probably, only hard to find what's missing...
This simple domain user account, should it also need to be part of the 'Distributed DCOM users' group?
Or the 'Event Log Readers' group should be enough?
Hi,
there are like 7 DCOM-In inbound rules with local port 135.
which of them needs to be allowed?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
11 | |
7 | |
7 | |
6 | |
6 | |
6 | |
4 | |
4 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY