While a host is Network contained, you need to allow the host to access internal network resources on specific IP addresses to perform patching and remediation. Which configuration would you choose?
While a host is Network contained, you need to allow the host to access internal network resources on specific IP addresses to perform patching and remediation. Which configuration would you choose?
When a host is network contained and needs to access specific internal IP addresses for patching and remediation, the correct approach is to configure a Containment Policy with the specific IP addresses. This policy manages the rules and exceptions that apply specifically to contained hosts, ensuring they can communicate with necessary IPs while remaining contained from other network traffic.
Correct Ans is B
D is wrong. C is the correct answer - while a host is contained, you must use the containment policy to allow the host to connect to other IP addresses. verified with the Falcon documentation.
correction - B should be the right answer.
C should be the correct anqser. Documentation checked. Should be a IP/CIDR range
C should be the correct anqser. Documentation checked. Should be a IP/CIDR range
It is filtered using CIDR range. But you can create multiple filters to flexibly control more allowed IPs.
B >> Correct Answer - Tested in LAB
The B is the correct answer, when a host is contained the firewall policy is not working. If you add a standar firewall rule, how can the product to know wich rules apply in containment status? The answer is defining the firewall containment firewall rules in a differente place, in this case is defined in the containment pollicy.
I would go with B as the requirement is to allow specific internal IP addresses and not the entire internal IP CIDR block.
B is correct
Going with B , tested in UI