Information Security is enforcing group-based policies by using security-event monitoring on Windows User-ID agents for IP-to-User mapping in the network. During the rollout, Information Security identified a gap for users authenticating to their VPN and wireless networks.
Root cause analysis showed that users were authenticating via RADIUS and that authentication events were not captured on the domain controllers that were being monitored. Information Security found that authentication events existed on the Identity Management solution (IDM).
There did not appear to be direct integration between PAN-OS and the IDM solution.
How can Information Security extract and learn IP-to-user mapping information from authentication events for VPN and wireless users?
TeachTrooper
Highly Voted 1 year agoali_sh85
Most Recent 7 months, 1 week agoaf67d32
1 week, 3 days agoMarshpillowz
1 year agoThunnu
1 year agoAndromeda1800
1 year, 2 months agotechplus
1 year, 3 months agopiipo
1 year, 3 months agopiipo
1 year, 3 months agodgonz
1 year, 5 months agoArtbrut
1 year, 5 months agoMerlin0o
1 year, 6 months agoWaheedeladawy
1 year, 7 months agoWaheedeladawy
1 year, 7 months agoPaloSteve
1 year, 7 months agosov4
1 year, 7 months agoFrightened_Acrobat
1 year, 7 months agoprocheeseburger
1 year, 7 months agorampa70
1 year, 7 months agomlj23
1 year, 8 months ago