Network setup: FSSO CA installed on a dedicated server, 4 domain controllers each with a DC agent. Domain controllers are 2012 R2, workstations are Windows 7.
Issue: Users logons occasionally fail to get tracked by the FSSO CA. A user will log in to Windows on their workstation but if you search the “Logon Users” in the CA the user does not show up. This causes the user to get web filter blocked by the firewall when visiting websites.
Findings:
Searching the “View Logon Events” log in the CA does not have an entry for the user logging on. The previous entry for that user is their dead entry timeout from the night before.
Searching the domain controller’s event viewer I do find a logon event for the user.
The CA has the default configuration for which event IDs to track (4768 and 4776) http://kb.fortinet.com/kb/viewContent.do?externalId=FD36424&sliceId=1
We are only auditing for event ID 4768, there are no 4776 event IDs present in the domain controller event viewer.
We are currently using the following settings in the CA: “Disable RDP Override” and “Support NTLM authentication”.
We have added all our AD service accounts to the “Ignore User List” in the CA.
I’ve been troubleshooting this with Fortinet support but they have not been able to resolve the issue so far. Currently they want me to verify that the server that hosts the FSSO CA returns the correct computer name and IP when an nslookup is done on the workstation from the server when the problem occurs, I am waiting for the issue to occur again so I can check this. I think the problem is most likely to do with the event IDs we are generating and tracking but I’m not sure how to troubleshoot this.
Any suggestions are appreciated.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
FSSO check event log to find logon user.
Double check your FSSO CA setting, which mode did FSSO use to find login user?
Make sure choose one which is works for your server.
DC Agent mode
Polling +NetAPI --old
Polling +event log
Polling +event log using WMI
The log on event is missing from the “View Logon Events” log.
We are using DC agent mode.
"The log on event is missing from the “View Logon Events” log."
Sound like Windows server issue.
Jeff_FTNT wrote:As in the domain controllers? They are generating event ID 4768, what else would the issue be?"The log on event is missing from the “View Logon Events” log."
Sound like Windows server issue.
Search event ID 4768 .
Kerberos Authentication Service/Audit Failure
Jeff_FTNT wrote:Search what, the domain controller events? Yes, the DCs are generating event ID 4768.Search event ID 4768 .
Kerberos Authentication Service/Audit Failure
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1634 | |
1063 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.