ExamGecko
Question list
Search
Search

Related questions











Question 347 - PCNSE discussion

Report
Export

A root cause analysis investigation into a recent security incident reveals that several decryption rules have been disabled. The security team wants to generate email alerts when decryption rules are changed.

How should email log forwarding be configured to achieve this goal?

A.
With the relevant configuration log filter inside Device > Log Settings
Answers
A.
With the relevant configuration log filter inside Device > Log Settings
B.
With the relevant system log filter inside Objects > Log Forwarding
Answers
B.
With the relevant system log filter inside Objects > Log Forwarding
C.
With the relevant system log filter inside Device > Log Settings
Answers
C.
With the relevant system log filter inside Device > Log Settings
D.
With the relevant configuration log filter inside Objects > Log Forwarding
Answers
D.
With the relevant configuration log filter inside Objects > Log Forwarding
Suggested answer: C

Explanation:

To generate email alerts when decryption rules are changed in a Palo Alto Networks firewall, you would configure email log forwarding based on specific system logs that capture changes to decryption policies. This is done by setting up log forwarding profiles with filters that match events related to decryption rule modifications. These profiles are then applied to the relevant log types within the firewall's log settings.

To specifically monitor for changes to decryption rules, you would navigate to the Device > Log Settings section of the firewall's web interface. Here, you can configure log forwarding for system logs, which capture configuration changes among other system-level events. By creating a filter that looks for logs associated with decryption rule changes, and associating this filter with an email server profile, the firewall can automatically send out email alerts whenever a decryption rule is modified.

This setup ensures that the security team is promptly notified of any changes to the decryption policies, allowing for quick review and action if the changes were unauthorized or unintended. It is an essential part of maintaining the security posture of the network and ensuring compliance with organizational policies on encrypted traffic inspection.

asked 23/09/2024
Mauricio de Souza Penhalver Hollanda
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first