Hi Suhaib Mohammad,
After reviewing the environment and the recent deployment of the new Domain Controller running Windows Server 2025, the issue may be related to compatibility between the current Fortinet Single Sign-On (FSSO) Collector Agent version 5.0.0330 and the new server operating system. In many environments, FSSO collects user authentication information by reading logon events from the Security Event Logs on the Domain Controllers. When a newer operating system such as Windows Server 2025 is introduced, the event log structure or access behavior can sometimes change. If the collector agent cannot properly read these log events from the new Domain Controller, it will fail to capture user authentication activities. As a result, the firewall cannot associate user identities with their IP addresses, which leads to firewall policies based on user or group identity not being applied correctly and causes disruptions to user internet access.
Another possible cause is related to authentication traffic being redirected to the newly deployed Domain Controller after it was promoted. Once DC5 becomes active in the environment, many user authentication requests may start being processed by this server. If the FSSO Collector Agent is not monitoring DC5 correctly or cannot communicate with it, the authentication events generated on that server will not be collected. This prevents the firewall from receiving updated login information for users who authenticate through DC5, which results in the firewall treating those users as unknown and therefore not applying the intended security policies.
To resolve the issue, the first step is to verify the compatibility of the FSSO Collector Agent with Windows Server 2025 and upgrade the collector agent to the latest supported version if necessary. After upgrading, the FSSO services should be restarted to ensure the collector begins monitoring authentication events correctly. It is also recommended to verify that DC5 appears in the monitored Domain Controller list within the collector agent configuration so that authentication logs from the new server are being collected properly.
The next step is to verify that the FSSO service account has the required permissions to access the Security Event Logs on all Domain Controllers, including DC5. Ensuring that the account has sufficient privileges will allow the collector to read login events without restriction. At the same time, network connectivity between the collector agent and the Domain Controllers should be confirmed to ensure there are no communication issues preventing event collection.
Finally, the overall health of the Active Directory environment should be validated to ensure replication and domain services are functioning normally across all Domain Controllers. This can be done using the following diagnostic commands to verify replication status and domain controller health:
repadmin /replsummary
dcdiag /v
In addition, checking whether authentication events are being generated and recorded on DC5 can help confirm that the server is functioning correctly:
Get-EventLog -LogName Security -InstanceId 4624 -Newest 10
Once the collector agent can successfully read authentication events from DC5 and Active Directory replication is confirmed to be healthy, the firewall should begin receiving accurate user-to-IP mapping information again. This will allow user-based security policies to function properly and restore normal internet access for users.
If this was helpful, please click "Accept Answer". If you have any further questions, you can leave a comment. Have a great day!
TV