As we have opened a new case on it 07354794, I wonder if this is a known result, because I cannot find any information about it.
Scenario:
Fully setup SATC Client / Firewall for a Windows 2022 terminal server .
User logins on the firewall are working as expected (at least when adding manual iptable lines for SATC traffic on port 6060. Ref. Case: 06506059).
User A logs on the terminal server. SATC sends new login for User A to firewall.
Firewall shows User A as Thin Client User.
User A runs a program on the terminal server as User AB (run-as). SATC sends new login for User AB to firewall.
Firewall shows User A and user AB as Thin Client User.
User A closes the program run by User AB. SATC sends nothing to firewall.
Firewall still shows User A and user AB as Thin Client User.
User A logs off from the terminal server. SATC sends logout info for User A to firewall.
Firewall shows only user AB as Thin Client User.
This state will remain on the firewall forever until you manually disconnect the user on the firewall or you restart the terminal server.
Endpoint:
Licensed | Assigned | Version |
---|---|---|
Core Agent | 2024.1.0.51 BETA | |
Sophos Intercept X | 2024.1.0.45.1 BETA | |
Managed Detection and Response | 2023.2.0.3 | |
XDR |
2024.1.0.51 BETA |
Non-EAP Products also affected.
Firewall: SFOS 19.5.3
This thread was automatically locked due to age.