0% found this document useful (0 votes)
14 views1 page

73 User ID Theory

Uploaded by

tiendat203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views1 page

73 User ID Theory

Uploaded by

tiendat203
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

User-ID (User Identification):

o Security infrastructure is based on three pillars application, user and content.


o The User Identification is a Palo Alto Networks next-generation firewall feature.
o User-ID, as opposed to IP address, is integral component of security infrastructure.
o User-ID, knowing which who is using each of the applications on your network.
o Who have transmitted threat or transferring files can strengthen security policies.
o User-Id technology not only identifies users with usernames but also IP Address.
o Create policies & display logs and reports based on usernames and group names.
o User-ID technology provide Visibility, Policy control, & Logging, reporting, forensics.
o Firewall collects Group Mapping info by connecting directly to LDAP directory server.
o Visibility into what users are doing on the network becomes increasingly important.
o Full visibility into user activity on the network & user-based policy control & reporting.
o Improved visibility into application usage and more relevant picture of network activity.
o Configuring User-ID enables ACC, App Scope, reports, and logs to include usernames.
o User-ID enables you to identify all users on your network using a variety of techniques.
o User-ID, when tied to the application activity, provides you with more complete visibility.
o Greater policy control, and more granular logging, reporting and forensics capabilities.
o Main things provide by User-ID is Visibility, Policy control & Logging, reporting, forensics.
o User-ID integrates Palo Alto firewall functionality with wide range of user repositories.

1 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717

You might also like