2.3 Ensure that User-ID is only enabled for internal trusted interfaces

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Only enable the User-ID option for interfaces that are both internal and trusted. There is rarely a legitimate need to allow WMI probing (or any user-id identification) on an untrusted interface. The exception to this is identification of remote-access VPN users, who are identified as they connect.

Rationale:

PAN released a customer advisory in October of 2014 warning of WMI probing on untrusted interfaces with User-ID enabled. This can result in theft of the password hash for the account used in WMI probing.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Navigate to Network > Network Profiles > Interface Management.
Set User-ID to be checked only for interfaces that are both internal and trusted; uncheck it for all other interfaces.

Impact:

If WMI probing is enabled without limiting the scope, internet hosts that are sources or destinations of traffic will be probed, and the password hash of the configured Domain Admin account can be captured by an outside attacker on such a host.

Default Value:

By default WMI probing and all User-ID functions are disabled.

References:

'Customer advisory: Security Impact of User-ID Misconfiguration' - https://live.paloaltonetworks.com/docs/DOC-8125

'R7-2014-16: Palo Alto Networks User-ID Credential Exposure' - https://blog.rapid7.com/2014/10/14/palo-alto-networks-userid-credential-exposure/

'Best Practices for Securing User-ID Deployments' - https://live.paloaltonetworks.com/docs/DOC-7912

'User-ID Best Practices' - https://live.paloaltonetworks.com/docs/DOC-6591

'PAN-OS Administrator's Guide 9.0 (English) - Client Probing' - https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/user-id-concepts/user-mapping/client-probing

See Also

https://workbench.cisecurity.org/files/2692