Helpful ReplyHot!Poll Active Directory server

Author
rtlucht1978
New Member
  • Total Posts : 1
  • Scores: 0
  • Reward points: 0
  • Joined: 2016/03/30 11:42:05
  • Status: offline
2021/07/19 13:06:19 (permalink)
0

Poll Active Directory server

Our AD is hardened and our service accounts are limited in what they can do.  I have a service account that I am attempting to poll active directory groups for usernames.  Currently my service account can query ldap and view event logs.  What other permissions would I need the service account to have.  Currently I have a red arrow on my active domain controller.
 
Our domain controllers are up to date and our Fortimanager is version 6.4.3 build 2201.
 
The connector does get a green arrow if we use domain admin credentials.
 
thank you
#1
xsilver_FTNT
Expert Member
  • Total Posts : 606
  • Scores: 163
  • Reward points: 0
  • Joined: 2015/02/02 03:22:58
  • Location: EMEA
  • Status: offline
Re: Poll Active Directory server 2021/08/02 06:00:56 (permalink)
0
From your comment I'm not sure if you do poll directly from FGT or you are using standalone Collector Agent.
And more precisely how do you gather logon events (DCAgents, Polling and which one, Advanced/Standard mode on Collector) ... 
However I would suggest to check this KB on 'Restricting FSSO service account'
https://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD36039
 
For more than few users my favorite setup is standalone Collector Agent polling WinSec+WMI. Two of those Collectors run on DCs for independent and resilient setup, used in a single SSO Connector on FGT side.
If more than single FGT is used and same user groups are supposed to be used, then Group Filter defined as Global/Default directly on Collector and so read from FGT. Instead of  filter pushed from every single FGT to Colelctor as that setup is then prone to errors on FGT admin side. FMG might eliminate that.

Tom xSilver, planet Earth, over and out!
#2
Bilel
New Member
  • Total Posts : 3
  • Scores: 2
  • Reward points: 0
  • Joined: 2018/10/01 03:24:24
  • Status: offline
Re: Poll Active Directory server 2021/08/04 06:05:36 (permalink)
0
Dear,
 
@ xsilver_FTNT. I read your posts and I appreciate your participation 
I have the same issue with a Fortigate101E running FortiOS 6.4.6.
I'm working on a POC to deploy FSSO in order to explore NG functionality 
As you said, our system department didn't agree to install agent on DCs so we've Installed a windows machine for the collector agent 5.0.0297 with Advanced access information with polling mode.
As I documented, i can conclude that my problem is that the collector couldn't read Event logs on ADs because of the extra number of auth (Company with more than 1500 users) and the small time configured to keep the logs (Logs are redirected to an RSA and deleted within 2 minutes regarding to the size of the Event log file) 
 
#First, I have the External Connectors 'Active Directory Connector' Down. and why we can see user and groups when using FSSO agent on windows AD! 
 Should we use ''FSSO agent on windows AD'' or AD Connector is enough on polling mode
[image][/image]
 
 
 
Please advice.
Regards
#3
xsilver_FTNT
Expert Member
  • Total Posts : 606
  • Scores: 163
  • Reward points: 0
  • Joined: 2015/02/02 03:22:58
  • Location: EMEA
  • Status: offline
Re: Poll Active Directory server 2021/08/09 08:31:03 (permalink) ☄ Helpfulby Bilel 2021/09/02 06:14:11
0
Hi Bilel,
unfortunately the pictures were not attached well.
 
However, for example my lab FortiOS 6.4.5 shows two possibilities in Security Fabric / External Connectors / New External Connector / "Endpoint/Identity" section.
1. FSSO Agent on Windows AD
2. Poll Active Directory Server
 
Those two are directly related to FSSO.
First "FSSO Agent on Windows AD" will point FGT to external, standalone, Collector Agent. Which can be installed on DC, or on any domain member Windows server class machine. And which, besides other modes, can poll Windows Security log, or query WMI for Windows Security events and specifically for those user logon related ones. That second method referred in Collector Agent as WinSec-WMI is what I would recommend to use. As it will gather just logon events directly via WMI, and relief Collector from extra burden when pure WinSec log is sequentially read and then parsed for just few suitable logon events while majority of collected data are "garbage" for FSSO purpose.
Second, "Poll Active Directory Server" will make FGT to do similar job as Collector does. Polling DCs for logon events. But it is less favorite method for me as it lacks versatility of standalone Collector Agent and brings extra load on FGT side.
 
If you can not keep WinSec logs, and WMI will not be enough to keep up speed in which your system destroys the evidence, then there is supposed to be MSFT way to duplicate logs to external WinSec log collector. But I never configured it, just hit that as some customers has standalone Collector Agent set to read WinSec logs not from all the DCs but from that single MSFT collector only. But I have little details on how it's made on MSFT side.
 
Alternatively, in standalone Collector Agent, or directly on FGT side in External Connectors, there is "RADIUS Single Sign-On Agent" .. sometimes referred simply as RSSO. Which is method where collector (no matter if standalone Collector or FGT in that role) learns logons events from provided RADIUS Accounting Start/Stop/Update messages. So for example if your users are authenticated via NPS, for example to WiFi, then NPS or wireless controller (WLC), should be able to send Accounting Requests to collector (again, standalone Collector Agent, or FGT in that role, or even FortiAuthenticator, which is probably not your case and I noted FortiAuthenticator just to complete listing of possible recipients).
 

Tom xSilver, planet Earth, over and out!
#4
Bilel
New Member
  • Total Posts : 3
  • Scores: 2
  • Reward points: 0
  • Joined: 2018/10/01 03:24:24
  • Status: offline
Re: Poll Active Directory server 2021/08/22 07:29:07 (permalink)
5 (1)
Hi again,
 
Come back to give a happy news,
 
I got finally the "FSSO Agent on Windows AD" UP, also the FSSo Collector shows now the FGTs on the Show Service Status.
I can get the User's IDs on the Show Logon Users from the EventLog.
The policy is working using the user's ID 
 
Helpful link: https://forum.fortinet.co...aspx?m=193413&fp=2
I will be available for assistance if any similar problems!
 
Thanks Again
#5
Jump to:
© 2021 APG vNext Commercial Version 5.5