Use the Administrator Login Activity Indicators to Detect Account Misuse (2024)

Use the Administrator Login Activity Indicators to DetectAccount Misuse

Updated on

Mon Jul 01 15:32:01 UTC 2024

Focus

Download PDF

Updated on

Mon Jul 01 15:32:01 UTC 2024

Focus

  1. Home
  2. PAN-OS
  3. Firewall Administration
  4. Use the Web Interface
  5. Use the Administrator Login Activity Indicators to DetectAccount Misuse

Download PDF

Table of Contents

End-of-Life (EoL)

Previous Configure Banners, Message of the Day, and Logos
Next Manage and Monitor Administrative Tasks

The last login time and failed login attemptsindicators provide a visual way to detect misuse of your administratoraccount on a Palo Alto Networks firewall or Panorama managementserver. Use the last login information to determine if someone elselogged in using your credentials and use the failed login attemptsindicator to determine if your account is being targeted in a brute-force attack.

  1. View the login activity indicators to monitorrecent activity on your account.

    1. Log in to the web interface on your firewallor Panorama management server.

    2. View the last login details located at the bottomleft of the window and verify that the timestamp corresponds toyour last login.

      Use the Administrator Login Activity Indicators to Detect Account Misuse (1)

    3. Look for a caution symbol to the right of the lastlogin time information for failed login attempts.

      The failed login indicator appears if one or more failedlogin attempts occurred using your account since the last successfullogin.

      1. If you see the cautionsymbol, hover over it to display the number of failed login attempts.

        Use the Administrator Login Activity Indicators to Detect Account Misuse (2)

      2. Click the caution symbol to view the failed login attempts summary.Details include the admin account name, the reason for the login failure,the source IP address, and the date and time.

        Afteryou successfully log in and then log out, the failed login counterresets to zero so you will see new failed login details, if any, thenext time you log in.

  2. Locate hosts that are continually attempting to log into your firewall or Panorama management server.

    1. Click the failed login caution symbol toview the failed login attempts summary.

    2. Locate and record the source IP address of the hostthat attempted to log in. For example, the following figure showsmultiple failed login attempts from the IP address 192.168.2.10.

      Use the Administrator Login Activity Indicators to Detect Account Misuse (3)

    3. Work with your network administrator to locate theuser and host that is using the IP address that you identified.

      If you cannot locate the system that is performing thebrute-force attack, consider renaming the account to prevent future attacks.

  3. Take the following actions if you detect an account compromise.

    1. Select

      Monitor

      Logs

      Configuration

      and viewthe configuration changes and commit history to determine if youraccount was used to make changes without your knowledge.

    2. Select

      Device

      Config Audit

      to compare thecurrent configuration and the configuration that was running justprior to the configuration you suspect was changed using your credentials.You can also do this using Panorama.

      If your administrator account was used to createa new account, performing a configuration audit helps you detectchanges that are associated with any unauthorized accounts, as well.

    3. Revert the configuration to a known good configurationif you see that logs were deleted or if you have difficulty determiningif improper changes were made using your account.

      Before you commit to a previous configuration, review itto ensure that it contains the correct settings. For example, theconfiguration that you revert to may not contain recent changes,so apply those changes after you commit the backup configuration.

      Use the following best practices to helpprevent brute-force attacks on privileged accounts.

      • Limitthe number of failed attempts allowed before the firewall locksa privileged account by setting the number of Failed Attempts andthe Lockout Time (min) in the authentication profile or in the Authentication Settingsfor the Management interface (

        Device

        Setup

        Management

        Authentication Settings

        ).

      • UseInterface Management Profiles to Restrict Access.

      • Enforce complex passwords for privileged accounts.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Configure Banners, Message of the Day, and Logos
Next Manage and Monitor Administrative Tasks

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

Use the Administrator Login Activity Indicators to Detect Account Misuse (2024)
Top Articles
Date, Time, and Sthapna Muhurat for Ganesh Puja in 2023
Ganesh Chaturthi 2024 Date: गणेश चतुर्थी 2024 में कब है, जानें गणेशोत्सव की शुरुआत और समाप्तिथि
My E Chart Elliot
Costco The Dalles Or
Craigslist Kennewick Pasco Richland
Think Of As Similar Crossword
Tabler Oklahoma
B67 Bus Time
Simple Steamed Purple Sweet Potatoes
Wordle auf Deutsch - Wordle mit Deutschen Wörtern Spielen
Gma Deals And Steals Today 2022
Alexandria Van Starrenburg
Baywatch 2017 123Movies
Bx11
Rams vs. Lions highlights: Detroit defeats Los Angeles 26-20 in overtime thriller
Kountry Pumpkin 29
Clare Briggs Guzman
Violent Night Showtimes Near Century 14 Vallejo
Seeking Arrangements Boston
Gs Dental Associates
Democrat And Chronicle Obituaries For This Week
Biografie - Geertjan Lassche
Alternatieven - Acteamo - WebCatalog
Pdx Weather Noaa
Fedex Walgreens Pickup Times
Acuity Eye Group - La Quinta Photos
Los Amigos Taquería Kalona Menu
Envy Nails Snoqualmie
Serenity Of Lathrop - Manteca Photos
Texas Baseball Officially Releases 2023 Schedule
Ducky Mcshweeney's Reviews
Devotion Showtimes Near Mjr Universal Grand Cinema 16
Tal 3L Zeus Replacement Lid
Levothyroxine Ati Template
More News, Rumors and Opinions Tuesday PM 7-9-2024 — Dinar Recaps
Gravel Racing
Umiami Sorority Rankings
Lovely Nails Prices (2024) – Salon Rates
Wunderground Orlando
Who Is Responsible for Writing Obituaries After Death? | Pottstown Funeral Home & Crematory
Pokemon Reborn Gyms
Coffee County Tag Office Douglas Ga
'The Night Agent' Star Luciane Buchanan's Dating Life Is a Mystery
John Wick: Kapitel 4 (2023)
Server Jobs Near
Jeep Forum Cj
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
What Time Do Papa John's Pizza Close
Gear Bicycle Sales Butler Pa
Where To Find Mega Ring In Pokemon Radical Red
Electronics coupons, offers & promotions | The Los Angeles Times
Fishing Hook Memorial Tattoo
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6303

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.