What can the Log Forwarding built-in action with tagging be used to accomplish?
What can the Log Forwarding built-in action with tagging be used to accomplish?
The Log Forwarding built-in action with tagging can be used to block the destination IP addresses of selected unwanted traffic. Tagging in log forwarding profiles allows for the identification and action upon specific IP addresses, which aligns with controlling and blocking unwanted traffic based on destination IP addresses.
It has options as Source address destination address user X-forwarded-For address
You can tag either Source or Destination IP addresses. On the other hand, A refers to an action you can only take on VM Series firewalls on Azure.
On the 1/23/24 exam
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-log-settings/select-log-forwarding-destinations --> not 100% sure if its A, but it states, that as built in actions for tagging and integration, if an Azure Subscription is present, Logs for tagged IPs can be forwarded to the Azure Sec. Center, I have not seen any info on blocking dest. IPs since this is done via security rules.
It says "can be used to accomplish". Not necessarily that it does it on its own.
Exactly!
You can tag 4 types of resources via those logs: User, Source Address, Destination Address (the answers), and X-forwarded for Address.
Tagging - block source/destination address Integration - Azure-Security-Center-Integration https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-log-forwarding
I think D
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-log-forwarding
Answer is D
last week's exam question
answer D: the built in action in log forwarding profiles only allow to tag IP addresses, users and x forwarded for IP addresses