exam questions

Exam PCNSE All Questions

View all questions & answers for the PCNSE exam

Exam PCNSE topic 1 question 539 discussion

Actual exam question from Palo Alto Networks's PCNSE
Question #: 539
Topic #: 1
[All PCNSE Questions]

Information Security is enforcing group-based policies by using security-event monitoring on Windows User-ID agents for IP-to-User mapping in the network. During the rollout, Information Security identified a gap for users authenticating to their VPN and wireless networks.

Root cause analysis showed that users were authenticating via RADIUS and that authentication events were not captured on the domain controllers that were being monitored. Information Security found that authentication events existed on the Identity Management solution (IDM).
There did not appear to be direct integration between PAN-OS and the IDM solution.

How can Information Security extract and learn IP-to-user mapping information from authentication events for VPN and wireless users?

  • A. Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over TLS.
  • B. Configure the User-ID XML API on PAN-OS firewalls to pull the authentication events directly from the IDM solution.
  • C. Add domain controllers that might be missing to perform security-event monitoring for VPN and wireless users.
  • D. Configure the Windows User-ID agents to monitor the VPN concentrators and wireless controllers for IP-to-User mapping.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
TeachTrooper
Highly Voted 1 year ago
Selected Answer: A
Must be A. B is wrong, because XM-API on the firewall does not pull. C is wrong, because the security log is the same on all DCs within an AD domain. D is wrong, because "There did not appear to be direct integration between PAN-OS and the IDM solution."
upvoted 6 times
...
ali_sh85
Most Recent 7 months, 1 week ago
Selected Answer: B
I think B is correct. XML API: The PAN-OS XML API is used in cases where standard user mapping methods might not work—for example, as third-party VPNs or 802.1x-enabled wireless networks
upvoted 2 times
af67d32
1 week, 3 days ago
the API on the FW only receives requests in the form curl -X POST 'https://<firewall>/api?type=op&cmd=<show><system><info></info></system></show>' not pull
upvoted 1 times
...
...
Marshpillowz
1 year ago
Selected Answer: A
Answer is A
upvoted 1 times
...
Thunnu
1 year ago
Answer is B
upvoted 1 times
...
Andromeda1800
1 year, 2 months ago
Selected Answer: A
A is valid.
upvoted 1 times
...
techplus
1 year, 3 months ago
Selected Answer: B
Real-world scenario https://www.reddit.com/r/paloaltonetworks/comments/izp7ll/wireless_user_identification_in_panos/
upvoted 1 times
...
piipo
1 year, 3 months ago
Selected Answer: B
There did not appear to be direct integration between PAN-OS and the IDM solution.
upvoted 1 times
piipo
1 year, 3 months ago
Sorry is A.
upvoted 2 times
...
...
dgonz
1 year, 5 months ago
Selected Answer: B
https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-ip-addresses-to-users/send-user-mappings-to-user-id-using-the-xml-api
upvoted 2 times
...
Artbrut
1 year, 5 months ago
The firewall wonˋ t pull, so A https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-ip-addresses-to-users/send-user-mappings-to-user-id-using-the-xml-api
upvoted 2 times
...
Merlin0o
1 year, 6 months ago
Selected Answer: A
A Src: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/user-id-concepts/user-mapping/syslog
upvoted 2 times
...
Waheedeladawy
1 year, 7 months ago
Aanswer is D The User-ID XML API on PAN-OS firewalls can be used to pull authentication events directly from the IDM solution. This will allow Information Security to extract and learn IP-to-user mapping information for VPN and wireless users. The other options are not as effective. Option A would allow Information Security to monitor more domain controllers, but it would not solve the problem of missing authentication events. Option C would not solve the problem because the authentication events are not being captured on the domain controllers. Option D would only work if the VPN concentrators and wireless controllers are configured to send syslog messages to the Windows User-ID agents.
upvoted 1 times
Waheedeladawy
1 year, 7 months ago
Sorry is B
upvoted 1 times
...
...
PaloSteve
1 year, 7 months ago
I think I'll go with Answer A. https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/user-id/map-ip-addresses-to-users. "To obtain user mappings from existing network services that authenticate users—such as wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC) mechanisms—Configure User-ID to Monitor Syslog Senders for User Mapping. While you can configure either the Windows agent or the PAN-OS integrated User-ID agent on the firewall to listen for authentication syslog messages from the network services, because only the PAN-OS integrated agent supports syslog listening over TLS, it is the preferred configuration."
upvoted 1 times
...
sov4
1 year, 7 months ago
Selected Answer: A
I believe it's A. Here's why: Valid - See link below - A. Configure the integrated User-ID agent on PAN-OS to accept Syslog messages over TLS. Not valid - API doesnt "pull". Period. - B. Configure the User-ID XML API on PAN-OS firewalls to pull the authentication events directly from the IDM solution. Not valid - Devices use Radius, not domain controllers. Wouldnt make a difference. - C. Add domain controllers that might be missing to perform security-event monitoring for VPN and wireless users. Almost valid - The windows user-id agent accepts syslog, just like the integrated agent. It doesnt "monitor" the devices... it listens for syslog. See link below - D. Configure the Windows User-ID agents to monitor the VPN concentrators and wireless controllers for IP-to-User mapping. https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-id-to-monitor-syslog-senders-for-user-mapping#iddb1a7744-17c6-4900-a2cb-5f3511fef60f
upvoted 2 times
...
Frightened_Acrobat
1 year, 7 months ago
Selected Answer: A
The link provided by mercysayno765 says to use the integrated PAN-OS User-ID agent to listen for Syslog senders. "To obtain user mappings from existing network services that authenticate users—such as wireless controllers" use Syslog. Further research into setting up Syslog for User-ID agent, it uses a TLS certificate. Which perfectly matches answer A. Answer B says it "pulls" the User-ID agent information. This isn't even how the API works.
upvoted 1 times
...
procheeseburger
1 year, 7 months ago
Selected Answer: B
The answer is B
upvoted 1 times
...
rampa70
1 year, 7 months ago
The option B would be otherwise ok but I'am not sure about the word "pull" on PAN-OS firewalls. As the firewall itself does not pull the data. You need something to run the script and send that data via XML API to PAN-OS firewall on correct format.
upvoted 1 times
...
mlj23
1 year, 8 months ago
B. Links that mercysayno765 provide below apply.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago