Hi Everyone,
Does anyone know how can we perform a rule trace using AD account as a filter on MWG? Our customer has a unique setup which the user's access to command prompt is not allowed and such. Therefore we cannot obtain the IP address of the user. Is there any way to perform a trace in this kind of setup?
Hope to obtain your feedback with my query. Thanks!
Solved! Go to Solution.
Hi,
if the user needs to be authanticated at the MWG (e.g. LDAP, NTLM) then you can create a new rule with the criteria Authentication.Username and in the event section use Enable RuleEngine Tracing (see attached screenshot).
You will find the rule tracing files under Troubleshooting-> Rule tracing files.
With this method you will only get requests/responses logged which are already authenticated, but on the other hand you will find out the user's IP address and then start a new rule tracing with it.
And don't forget to disable the rule otherwise it won't stop tracing.
Hope this helps.
Cheers,
Mike
Hi,
if the user needs to be authanticated at the MWG (e.g. LDAP, NTLM) then you can create a new rule with the criteria Authentication.Username and in the event section use Enable RuleEngine Tracing (see attached screenshot).
You will find the rule tracing files under Troubleshooting-> Rule tracing files.
With this method you will only get requests/responses logged which are already authenticated, but on the other hand you will find out the user's IP address and then start a new rule tracing with it.
And don't forget to disable the rule otherwise it won't stop tracing.
Hope this helps.
Cheers,
Mike
Another option is to have the user hit a block page, and the block page show the IP of the user. You could then use this in the trace (we do this to get the IP address of non-technical users)
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use our Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: