<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE PassiveID and WMI pulling in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3928476#M457053</link>
    <description>&lt;P&gt;Hi, solved the problem with customer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE collects kerberos events from Security Event logs. Customer didn't have Kerberos logging turned on, which is by default turned off in Windows. We enabled Audit Kerberos Authentication Service through Advance Audit policy in GPO and applied to DCs. Soon after kerberos logon IDs were seen in Security Event log. After that ISE started to display sessions in PassiveID&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Procedure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.manageengine.com/products/active-directory-audit/help/getting-started/domain-controllers-advanced-audit-policy.html" target="_blank"&gt;https://www.manageengine.com/products/active-directory-audit/help/getting-started/domain-controllers-advanced-audit-policy.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft about Kerberos Audit Service:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fauditing%2Faudit-kerberos-authentication-service&amp;amp;data=01%7C01%7Cneven.kottnig%40rba.hr%7C1b0c029d71c346de748408d73cdefc75%7C9b511fdaf0b143a5b06e1e720f64520a%7C0&amp;amp;sdata=z7N5t%2BZNqvSG9wdJxIUj%2FTJPtjkFn3jtIfk2Pk6bVRY%3D&amp;amp;reserved=0" target="_blank"&gt;https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-kerberos-authentication-service&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Vedran.&lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2019 11:44:04 GMT</pubDate>
    <dc:creator>vfranjic</dc:creator>
    <dc:date>2019-09-23T11:44:04Z</dc:date>
    <item>
      <title>ISE PassiveID and WMI pulling</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3926423#M457018</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have project for both StealthWatch and ISE. Plan is to configure ISE 2.4 patch 9 to pull events through WMI from Windows Server 2016 to ISE and share it with Stealthwatch. We have problems with ISE collecting events from AD. We used Domain admin account and event went through manual configuration of WMI on DC providing all needed rights and created registry keys. There is no L3/L4 obsticle.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Connection to DC is green in PassiveID dashboard and test WMI is ok, it gets right Domain name, etc&lt;/P&gt;
&lt;P&gt;2. WMI DC is configured automatically and manually we checked all permisions and created Registry keys for Account that ISE uses when contacting DC&lt;/P&gt;
&lt;P&gt;3. No sessions are collected from DC&lt;/P&gt;
&lt;P&gt;4. We set DEBUG level for PassiveID and we get below:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;2019-09-18 16:11:04,202 DEBUG [Thread-82275][] com.cisco.idc.dc-probe- &lt;U&gt;&lt;STRONG&gt;DCOM timeout reached on DC&lt;/STRONG&gt;&lt;/U&gt;. Identity Mapping.NTLMv2 = true , Identity Mapping.dc-domainname = XXXXXX , Identity Mapping.probe = WMI , Identity Mapping.dc-windows-version = Win2016 , Identity Mapping.dc-username = XXXXX , Identity Mapping.dc-name = XXXXXXX , Identity Mapping.dc-host = XXXXXXX/10.239.5.20&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;5. On Windows side we have Event log error with ID 5858 for WMI Activity with ResultCode:&amp;nbsp;&lt;SPAN&gt;0x80041032&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone provide help? Also we did this with two ISEs but problem remains same.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anybody know which Security logon event ID ISE PassiveID requests from DC: 4768 or 4624, because user has no 4768 events and if we look into WMI error we see ISE requesting 4768 event ID from DC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tnx in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Vedran.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 16:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3926423#M457018</guid>
      <dc:creator>vfranjic</dc:creator>
      <dc:date>2019-09-18T16:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE PassiveID and WMI pulling</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3928470#M457019</link>
      <description>&lt;P&gt;I suggest opening a TAC SR to root cause the issue.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 11:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3928470#M457019</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2019-09-23T11:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: ISE PassiveID and WMI pulling</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3928476#M457053</link>
      <description>&lt;P&gt;Hi, solved the problem with customer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISE collects kerberos events from Security Event logs. Customer didn't have Kerberos logging turned on, which is by default turned off in Windows. We enabled Audit Kerberos Authentication Service through Advance Audit policy in GPO and applied to DCs. Soon after kerberos logon IDs were seen in Security Event log. After that ISE started to display sessions in PassiveID&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Procedure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.manageengine.com/products/active-directory-audit/help/getting-started/domain-controllers-advanced-audit-policy.html" target="_blank"&gt;https://www.manageengine.com/products/active-directory-audit/help/getting-started/domain-controllers-advanced-audit-policy.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft about Kerberos Audit Service:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fauditing%2Faudit-kerberos-authentication-service&amp;amp;data=01%7C01%7Cneven.kottnig%40rba.hr%7C1b0c029d71c346de748408d73cdefc75%7C9b511fdaf0b143a5b06e1e720f64520a%7C0&amp;amp;sdata=z7N5t%2BZNqvSG9wdJxIUj%2FTJPtjkFn3jtIfk2Pk6bVRY%3D&amp;amp;reserved=0" target="_blank"&gt;https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-kerberos-authentication-service&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Vedran.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 11:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/3928476#M457053</guid>
      <dc:creator>vfranjic</dc:creator>
      <dc:date>2019-09-23T11:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE PassiveID and WMI pulling</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/4185248#M563900</link>
      <description>&lt;P&gt;WMI configuration from ISE to DC does not enable Kerberos Audit authentication service and it should be enabled by yourself because it&amp;nbsp;&lt;SPAN&gt;is turned off by default. Very frustrating&amp;nbsp; because no ISE PIC documentation mention this configuration and every test on ISE is OK but no passive authentication is coming on ISE.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="krb.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/88757i1BB3383CB092F5C3/image-size/large?v=v2&amp;amp;px=999" role="button" title="krb.JPG" alt="krb.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2020 13:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-passiveid-and-wmi-pulling/m-p/4185248#M563900</guid>
      <dc:creator>marinogr</dc:creator>
      <dc:date>2020-11-18T13:59:52Z</dc:date>
    </item>
  </channel>
</rss>

