FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
mricardez
Staff
Staff
Article Id 263503
Description This article describes how to install the FSAE (also known as the 'Collector Agent') on a PC that belongs to the Windows Domain instead to install it on the AD itself.
Scope FSAE v5.0.0289 and earlier.
Solution

There are some restrictions concerning the installation of third-party software on the Windows Active Directory server.

 

The FSAE or CA has the flexibility to be installed on a PC that belongs to the Windows domain and is dedicated to this task.

 

Additionally, there is the option to work FSSO in Polling Mode where you only install the FSAE without reboot required and without installing any software on the AD.

 

 Following the following topology and elements on the Windows Domain (markoz.local):

 

  1. The AD1 and PC1 are the elements already existing on the network. 
  2. The FSSOCA can be the new element (PC or a Windows VM) which belongs to the domain.

 

Device Hostname IP VLAN
WinServer 2012 AD1 192.168.64.100 364
Win10 PC1 192.168.65.180 365
Win10 FSSOCA 192.168.63.120 363

 

Captura de pantalla de 2023-07-11 15-51-19.png

 

  • Create a user account (fgt_polling) on the AD with privileges of 'Domain Admins' or 'Event Log Readers' group. 
    • Usually, the 'Event Los Reader' privilege is enough to monitor the logon events in Polling Mode (option 'Check Windows Security Event Logs').
    • During FSAE installation and configuration, changes setting on the application will require elevating the privileges to the 'Domain Admins' group.
    • After the installation and configuration on the FSAE, the permissions could be reduced to only 'Event Log Readers'.

 

Captura de pantalla de 2023-07-11 16-13-54.png

 

About AD user account privileges to FSSO, refer to:

Technical-Tip-Restricting-a-Fortinet-Single-Sign-On-Agent 

 

  • Login to PC FSSOCA with the user fgt_polling and install the 'FSSO_Setup_5.0.0XXX.exe'.

Remember to use the user account with the privileges that the application will be run as a service in Windows.

 

Captura de pantalla de 2023-07-11 16-44-24.png

 

  • On this LAB, the FSAE will collect the logs in 'Polling Mode'. Therefore, the 'Launch DC Agent Install Wizard' is unselected.

 

Captura de pantalla de 2023-07-11 16-48-55.png

 

  • Launch the FSAE application 'Configure Fortinet Single Sign On Agent'.
  • The option "Run as administrator" appear since the user belong to the 'Domain Admins'and allow to make changes to the FSAE configuration.
  • Only having 'Event Log Readers' will not allow the application configurations changes to the FASE. Therefore, it will be necessary to elevate the privileges with the user account when the application has been launched.

 

Imagen1.png 

  • Select the AD server to poll and collect the user logins.

 

Imagen5.png

 

Imagen4.png

 

In the beginning, logons will not be received on the FSAE.

 

Imagen6.png 

  • 'Refresh Now' to update the polling AD.
    • Each time the FASE poll the AD to obtain logons the #Logons Events will increase.
    • Without new logons on the AD, the polling only will be a 'KEEPALIVE'.

 

Imagen7.png

 

  • Select 'Show Logon Users' to display the logons collected from the FSAE.

 

Captura de pantalla de 2023-07-12 10-53-29.png

 

Troubleshooting.

 

In polling mode, the CA polls port 445 of each DC for user logon information every few seconds and forward it to the FortiGate.

 

On the AD, it is possible to validate the FSAE connected to the 'Shared Folders' service (SMB) and keep open a file 'eventlog'.

 

Captura de pantalla de 2023-07-12 11-44-21.png

 

Captura de pantalla de 2023-07-12 11-44-45.png

 

If logons are not received, try enabling 'Audit Account Logon Events' on the AD.

 

  • Open the 'Group Policy Management' Console by running the command 'gpmc.msc' or by GUI.

 

Imagen8.png

 

  • Expand the node Domain Controllers, 'Right-click' on the GPO Default Domain Controllers Policy, and select 'Edit'.

 

Imagen11.png

 

  • Expand Computer Configuration, and go to the node Audit Policy (Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Audit Policy).

Imagen12.png

 

  • 'Double-click' on the policy settings 'Audit account logon events', check Success and Failure audit, and select 'OK'.

 

Imagen13.png

 

  • Now, update gpo by running the command 'gpupate /force'.

 

Captura de pantalla de 2023-07-12 12-34-46.png

Contributors