ExamGecko
Question list
Search
Search

Related questions











Question 363 - PCNSE discussion

Report
Export

Which server platforms can be monitored when a company is deploying User-ID through server monitoring in an environment with diverse directory services?

A.
Red Hat Linux, Microsoft Exchange, and Microsoft Terminal Server
Answers
A.
Red Hat Linux, Microsoft Exchange, and Microsoft Terminal Server
B.
Novell eDirectory, Microsoft Terminal Server, and Microsoft Active Directory
Answers
B.
Novell eDirectory, Microsoft Terminal Server, and Microsoft Active Directory
C.
Red Hat Linux, Microsoft Active Directory, and Microsoft Exchange
Answers
C.
Red Hat Linux, Microsoft Active Directory, and Microsoft Exchange
D.
Novell eDirectory, Microsoft Exchange, and Microsoft Active Directory
Answers
D.
Novell eDirectory, Microsoft Exchange, and Microsoft Active Directory
Suggested answer: C

Explanation:

When deploying User-ID in environments with diverse directory services, Palo Alto Networks firewalls have the capability to monitor several types of servers to gather user mapping information. Among the options provided:

C) Red Hat Linux, Microsoft Active Directory, and Microsoft Exchange:

Red Hat Linux: Palo Alto Networks User-ID can monitor Linux systems to gather user information, typically by integrating with services like syslog or by using an agent that reads user login events.

Microsoft Active Directory: This is one of the most common sources for User-ID, as Active Directory is widely used for user management and authentication. User-ID can directly integrate with Active Directory to read security event logs, capturing user login and logout events.

Microsoft Exchange: While not directly monitored for user login events, Microsoft Exchange can be a source of IP-to-user mapping information, especially for users accessing email services. This can be achieved by parsing Exchange logs for client access information.

These platforms can provide valuable data for User-ID, enabling the firewall to apply policies based on user identity across diverse network environments.

asked 23/09/2024
christopher tenney
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first