setup non-admin user to query domain controller event · pdf filesetup non-admin user to query...

13
© Juniper Networks, Inc. 1 Setup non-admin user to query Domain Controller event log for Windows2008 and Windows2012 INTRODUCTION In Userfw AD integration solution, SRX queries the Domain Controller event log to get the user-to-ip mapping. The easiest way would be to configure the SRX to query the Domain Controller, is using a user who is part of the Domain Administrator group. This is restrictive and potentially risky to administrators and we need to provide a way for the firewall to query the Domain Controller via a user with non- admin privileges. SRX uses Windows Management Instrumentation (WMI) to query Active Directory Domain Controllers for the Security Event logs. To handle the remote call to DC, we also use Distributed COM (DCOM) technology. To allow SRX to use a non-admin account for DC connectivity,it should have event log reading permission. For a non-admin user, it should have the following permissions to query DC § DCOM Permission § WMI Permission § Event log reading permission To minimize the permission of this non-admin user the following permission will be denied: § Interactive Logon Note: Using this non-admin user account to access the domain devices for other purpose may fail due to the permission restriction. To allow PC-Probe feature, please use an account in domain administrators group, as Windows requires the administrator privileges to return the logged on users info in a Windows client PC.

Upload: vuongminh

Post on 30-Mar-2018

248 views

Category:

Documents


0 download

TRANSCRIPT

©JuniperNetworks,Inc.1

Setup non-admin user to query Domain Controller event log for Windows2008 and Windows2012 INTRODUCTION InUserfwADintegrationsolution,SRXqueriestheDomainControllereventlogtogettheuser-to-ipmapping.TheeasiestwaywouldbetoconfiguretheSRXtoquerytheDomainController,isusingauserwhoispartoftheDomainAdministratorgroup.ThisisrestrictiveandpotentiallyriskytoadministratorsandweneedtoprovideawayforthefirewalltoquerytheDomainControllerviaauserwithnon-adminprivileges.SRXusesWindowsManagementInstrumentation(WMI)toqueryActiveDirectoryDomainControllersfortheSecurityEventlogs.TohandletheremotecalltoDC,wealsouseDistributedCOM(DCOM)technology.ToallowSRXtouseanon-adminaccountforDCconnectivity,itshouldhaveeventlogreadingpermission.Foranon-adminuser,itshouldhavethefollowingpermissionstoqueryDC

§ DCOMPermission§ WMIPermission§ Eventlogreadingpermission

Tominimizethepermissionofthisnon-adminuserthefollowingpermissionwillbedenied:

§ InteractiveLogonNote:

Usingthisnon-adminuseraccounttoaccessthedomaindevicesforotherpurposemayfailduetothepermissionrestriction.ToallowPC-Probefeature,pleaseuseanaccountindomainadministratorsgroup,asWindowsrequirestheadministratorprivilegestoreturntheloggedonusersinfoinaWindowsclientPC.

©JuniperNetworks,Inc.2

INSTRUCTIONS Step1:Createadomainuser

§ OpenupActiveDirecotryUsersandComputers

StartàAdministrativeToolsàActiveDirectoryUsersandComputers

§ Addnewuser

RightClickUsersàNewàUser

§ FillinrequiredfieldstoCreateuser

Step2:GrantuserDCOMpermission

§ StartàRun,orincommandlineconsole,inputdcomcnfg

©JuniperNetworks,Inc.3

§ ClickontoConsoleRootàComponentServicesàComputers,right-clickMyComputeràselectProperties.Thenanewwindowopens.ThenclickontheCOMSecuritytab.

§ IntheLaunchandActivationPermissionsareaclickEditLimitsbutton.Inthenewwindow,ClickADD.EnterintheUsernamecreatedinStep1intothelowerboxandclickonCheckNames.ClickOK.

©JuniperNetworks,Inc.4

§ GranttheusertheRemoteActivationpermissionbyclickingonuserandthenselectingthecheckbox.RemoveLocalLaunchpermissionbyclickingoncheckmarktoremove.ThenclickOKtoexit.

§ ClickOKandcloseoutofComponentServiceswindow.

©JuniperNetworks,Inc.5

Step3:GrantuserWMIpermission

§ OpenWindowsManagementInstrumentation(WMI)console: StartàRun,orincommandlineconsole,inputwmimgmt.msc

§ Right-clickWMIControlandselectProperties.§ SelecttheSecuritytabandexpand"Root".

§ SelectCIMV2andclickSecurity.

©JuniperNetworks,Inc.6

§ ClickADD.EnterintheUsernamecreatedinStep1intothelowerboxandclickonCheckNames.ClickOK.

§ GranttheuserRemoteEnablepermissionsbyclickingonuserandthenselectingthecheckbox.RemoveEnableAccountpermissionbyclickingonCheckMarkbox.ThenclickOKtoexit.

©JuniperNetworks,Inc.7

§ ClickOKtoWMIPropertiesscreenandclosewmimgmtwindow.Step4:GranttheuserEventLogaccesspermissions

§ OpenupGroupsPolicyManagement StartàAdministrativeToolsàGroupsPolicyManagement.

©JuniperNetworks,Inc.8

§ ExpandtheForesttreetolocateDefaultDomainControllersPolicy

§ Right-clickDefaultDomainControllersPolicyandselectEdittoopenuptheEditorwindow.

§ UnderDefaultDomainControllersPolicyexpandthefollowingtree:ComputerConfigurationàPoliciesàWindowsSettingsàSecuritySettingsàLocalPoliciesàUserRightsAssignment

©JuniperNetworks,Inc.9

§ IntherightpartoftheWindow,locateanddouble-clickManageauditingandsecuritylog.

§ InthenewwindowclicktheAddUserorGroupbuttonandselectBrowse.

©JuniperNetworks,Inc.10

§ EnterintheUsernamecreatedinStep1intothelowerboxandclickonCheckNames.ClickOK.

§ ClickOKtwiceStep5:DenyInteractiveLogonabilityfortheuser

§ OpenupGroupsPolicyManagementEditor,ifclosedfrompreviousstep4. StartàAdministrativeToolsàGroupsPolicyManagement.ExpandtheForesttreetolocateDefaultDomainControllersPolicyandRight-clickDefaultDomainControllersPolicyandselectEdit

§ UnderDefaultDomainControllersPolicyexpandthefollowingtree:

ComputerConfigurationàPoliciesàWindowsSettingsàSecuritySettingsàLocalPoliciesàUserRightsAssignment

§ IntherightpartoftheGroupPolicyManagementEditorwindow,locateanddouble-clickDenylogonlocally.

©JuniperNetworks,Inc.11

§ InthenewwindowclicktheAddUserorGroupbuttonandselectBrowse.

©JuniperNetworks,Inc.12

§ EnterintheUsernamecreatedinStep1intothelowerboxandclickonCheckNames.ClickOK.

§ ClickOKtwice

§ IntherightpartoftheGroupPolicyManagementEditorwindow,locateanddouble-clickDenylogonthroughRemoteDesktopServices.

§ RepeatthestepstoaddUsernameinStep1tolistandclickOKtwice.

§ CloseGroupPolicyManagementEditorWindowStep5:RestartWMIService

§ OpenWindowsManagementInstrumentation(WMI)console: StartàRun,orincommandlineconsole,inputservices.msc

§ LocatetheWindowsManagementInstrumentationserviceandrestartitbyrightclickingtheserviceandclickingontheRestartoption.

©JuniperNetworks,Inc.13

Step6:Configurethenon-domainuserinSRX

#set services user-identification active-directory-access domain SRXTEST user <user from step 1> (in this example “non_admin”) #set services user-identification active-directory-access domain SRXTEST user password <password entered as part of step 1>