I have done everthing mentioned in video, status showing connected. but source user is not showing. when i execute this show user ip-user-mapping all, result showing palo lan interface ip as test\paloalto(ad user account). not sure where it wrong. could you please help regarding this.
Hello @firewalllife I hope you are doing well! Basically, User ID Agent-based integration is required to authenticate the user and we need to create an include group list to make it work. Whereas Agentless User ID will just prob and collect the necessary logs to the Domain controller to map the IP address to Username by reading Event logs. For this, we don't need any Group Mapping? Please correct me if I'm wrong.
I have done everthing mentioned in video, status showing connected. but source user is not showing. when i execute this show user ip-user-mapping all, result showing palo lan interface ip as test\paloalto(ad user account). not sure where it wrong. could you please help regarding this.
Can you please contact me via email.
Hello @firewalllife
I hope you are doing well!
Basically, User ID Agent-based integration is required to authenticate the user and we need to create an include group list to make it work.
Whereas Agentless User ID will just prob and collect the necessary logs to the Domain controller to map the IP address to Username by reading Event logs. For this, we don't need any Group Mapping? Please correct me if I'm wrong.
Thanks bro!
Thank you for your valuable comment. It really helps.
@@firewalllife could you help me ?? I have some problem with user ID
@@orkhanjabrayilov Please contact me via email in the about section please.