Hi, I am seeing monitor on users and devices, and I choose the "show all fsso logons" and the list shows in name user "IUSR_TASK", what is the meaning this name?
Hi Dirome,
I am not aware of any "IUSR_TASK" meaning there. Could you post a screenshot so me and maybe others looking here know what you do exactly mean?
Also, you can cross-check what you see in GUI "Show all fsso logons" in CLI by executing command
diagnose debug auth fsso list
If you see this user in the list too, information came already from FSSO Collector Agent, and you have to check there too.
Fishbone )(
smithproxy hacker - www.smithproxy.org
that points it to be a user in your environment, might be some service account or such. have you checked your AD user list to see if it is there?
Hi Dirome,
Boneyard is correct, this is your AD user. You don't see any groups for it, since some of his AD groups is present in group-filter, but is at the same time not associated to any Fortigate group.
Fishbone )(
smithproxy hacker - www.smithproxy.org
Hi boneyard / Fishbone,
I checked with admin of AD and this is a user of service.
Thanks to all
Hi Dirome,
great you figured out! I am pretty sure you know what we usually do with such users, so just for completeness for other readers: typically you will want to add this user to "ignore list" in FSSO Collector Agent.
Why? Because service which runs as different user can trigger logon event. This event could be detected by FSSO Collector Agent polling thread, which will replace current user logon entry in its FSSO logon list. This is very common mistake in many FSSO setups.
In recent FSSO CA versions you can also use in "ignore list" wildcard matching with '*' and '?', which makes list very maintainable. For example, you can keep some naming convention for service users, say, "*_TASK" and use this pattern in "ignore list" too.
To illustrate problem in more detail, here goes some (rather longer) example:
[ol]
So please don't underestimate service accounts, pay very close attention to them, especially how they are used on workstations.
My 2c,
Fishbone )(
smithproxy hacker - www.smithproxy.org
Hi Fishbone, I'm sorry I was very busy with other topics, but your last answer complement better the last information. Very thanks. dirome
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1113 | |
759 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.