Exam PCNSE All QuestionsBrowse all questions from this exam
Question 347

A network security administrator has an environment with multiple forms of authentication. There is a network access control system in place that authenticates and restricts access for wireless users, multiple Windows domain controllers, and an MDM solution for company-provided smartphones. All of these devices have their authentication events logged.

Given the information, what is the best choice for deploying User-ID to ensure maximum coverage?

    Correct Answer: B

    Given a network security environment with multiple forms of authentication such as network access control systems, Windows domain controllers, and MDM solutions, the best choice for deploying User-ID to ensure maximum coverage is a syslog listener. A syslog listener can receive syslog messages from various systems and parse them for IP address-to-username mappings. Since it can collect user mapping information from diverse sources, it provides a comprehensive and flexible solution suitable for environments with diverse authentication mechanisms.

Discussion
scallyOption: B

B is the correct answer here. "To obtain user mappings from existing network services that authenticate users—such as wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC) mechanisms—Configure User-ID to Monitor Syslog Senders for User Mapping." https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-ip-addresses-to-users

JRKhanOption: B

B is correct. A syslog listener is the best choice for deploying User-ID to ensure maximum coverage in an environment with multiple forms of authentication. A syslog listener is a feature that enables the firewall or Panorama to receive syslog messages from other systems and parse them for IP address-to-username mappings. A syslog listener can collect user mapping information from a variety of sources, such as network access control systems, domain controllers, MDM solutions, VPN gateways, wireless controllers, proxies, and more. A syslog listener can also support multiple platforms and operating systems, such as Windows, Linux, macOS, iOS, Android, etc. Therefore, a syslog listener can provide a comprehensive and flexible solution for User-ID deployment in a large-scale network. References: Configure a Syslog Listener for User Mapping, User-ID Agent Deployment Guide, PCNSE Study Guide (page 48)

juan_LOption: B

Based on my own experience working with Forescout and others , the NAC platforms has full capabilities to identify users connected at any host (admin credentials, agent, wmi inspection, 802.1x...), and infinity possibilities to send information via syslog, so... without place to doubts B is the correct.

mizuno92Option: B

Agreed with B

dorf05Option: A

The key word is ......." an environment with multiple forms of authentication"

dorf05Option: A

A large-scale network can also have numerous firewalls that use the mapping information to enforce policies. You can reduce the resources that the firewalls and information sources use in the querying process by configuring some firewalls to acquire mapping information through redistribution instead of direct querying. Redistribution also enables the firewalls to enforce user-based policies when users rely on local sources for authentication (such as regional directory services) but need access to remote services and applications (such as global data center applications).

TheIronSheik

I think this should be B and D.

floonkyOption: B

B. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-id-to-monitor-syslog-senders-for-user-mapping#iddb1a7744-17c6-4900-a2cb-5f3511fef60f

confusionOption: B

B To obtain user mappings from existing network services that authenticate users—such as wireless controllers, 802.1x devices, Apple Open Directory servers, proxy servers, or other Network Access Control (NAC) mechanisms—Configure User-ID to Monitor Syslog Senders for User Mapping.