Your company occupies one floor in a single building. You have two Active Directory domain controllers on a single network. The firewall's management plane is only slightly utilized. Which User-ID agent is sufficient in your network?
A.
Windows-based agent deployed on each domain controller
B.
PAN-OS integrated agent deployed on the firewall
C.
Citrix terminal server agent deployed on the network
D.
Windows-based agent deployed on the internal network a domain member
The PAN-OS Integrated Agent is more efficient in terms of network resources since it filters logs, whereas the Windows-Based Agent sends all security logs to the firewall.
B
Which User-ID agent should I use?
Use agentless (PAN-OS)
If you have a small to medium deployment with 10 or fewer Domain controllers or Exchange servers
If you wish to share PAN-OS sourced mappings from AD, Captive portal or Global Protect with other PA devices (max 255 devices)
Use User-ID Agent (Windows)
If you have medium to large deployment with more than 10 domain controllers
If you have multi-domain setup with large number of servers to monitor
When they're talking about "sufficient bandwidth" and "sufficient resources" on the firewall, they are always hinting at the PAN-OS integrated agent.
When they're talking about "limited network bandwidth" and/or the "management plane is heavily used", then they want you to use the Server agent.
PAN-OS Integrated User-ID Agent agent is used mostly for remote sites and it can't handle multiforest domains.
Windows-based User-ID Agent at the local site. In this case its all on the same network so I think it should be "A"
Although, the Windows-based agent and the PAN-OS integrated agent perform the same basic tasks, they use different underlying communication protocols. This difference makes each agent more appropriate for different environments.
The Windows-based agent uses MS-RPC, which requires the full Windows Security logs to be sent to the agent, where they are filtered for the relevant User-ID information.
The PAN-OS integrated agent uses either the Windows Management Instrumentation, of WMI, or the Windows Remote Management Protocol, or WinRM which enables the agent to retrieve only the User-ID information from the Windows Security logs.
The result is that, in an infrastructure with remote networks separated with WAN links, the integrated agent is more appropriate for reading remote logs and the Windows-based agent is more appropriate for reading local logs.However, uses of the integrated agent is not without cost: it consumes more of the firewall’s management plane resources. For this reason, deployment of the Windows agent at remote sites and having them forward the relevant User-ID information to firewall on a central network often is beneficial.
The integrated agent can only handle 1 AD domain, but can monitor up to 100 domain controllers. This question doesn't say more than one AD is active. Therefore, i believe B is correct.
, if network bandwidth is an issue, you might want to use the PAN-OS integrated agent because it
communicates directly with the servers, whereas the Windows agent communicates with the servers and
then communicates the User-ID information to the firewall so that it can update the firewall database.
For more information about the different agents and how they are used, see the following information:
• “Block Threats by Identifying Users ” module in the EDU-110 and EDU-210 training,
Firewall Essentials: Configuration and Management
I think B is correct answer
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
debabani
Highly Voted 2 years, 5 months agoo0ZACK0o
Most Recent 4 months, 1 week agokuaiquchifan
6 months, 1 week agoDDisGR8
11 months agoz8d21oczd
1 year agovexon
1 year agoLetrange
1 year, 1 month agodaan5000
1 year, 3 months agoyurakoresh
1 year, 5 months agoRowdy_47
1 year, 10 months agoDefvianti
2 years, 4 months agojonboy22
1 year, 3 months agojonboy22
1 year, 3 months agoLucerorudeboy
2 years, 5 months agoatifikhan
2 years, 6 months agoElDTO91
2 years, 7 months ago