An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted information Security to look for more controls that can secure access to critical assets. For users that need to access these systems, Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MFA.
What should the enterprise do to use PAN-OS MFA?
homersimpson
Highly Voted 3 years agoJRKhan
Highly Voted 1 year agojeremykebir
6 months, 3 weeks agoNicoara
Most Recent 5 months, 1 week ago443Annny
3 weeks, 3 days agoWhizdhum
1 year, 1 month agoEiffelsturm
1 year, 1 month agoGabranch
1 year, 1 month agogc999
1 year, 2 months agojosephrahul
1 year, 6 months agodgonz
1 year, 6 months agoTechn
1 year, 6 months agoericli87
1 year, 9 months agoPochex
1 year, 10 months agoFrightened_Acrobat
1 year, 10 months agomagicbr3
1 year agomohr22
1 year, 11 months agoTAKUM1y
2 years, 1 month agoscally
2 years, 4 months agoUFanat
2 years, 7 months agoMarcyy
3 years, 1 month agohomersimpson
3 years agoShenanigans123
2 years, 9 months agoGngogh
2 years, 3 months agoGivemeMoney
2 years, 12 months ago