What can the Log Forwarding built-in action with tagging be used to accomplish?
What can the Log Forwarding built-in action with tagging be used to accomplish?
The Log Forwarding built-in action with tagging can be used to block the destination IP addresses of selected unwanted traffic. Tagging in log forwarding profiles allows for the identification and action upon specific IP addresses, which aligns with controlling and blocking unwanted traffic based on destination IP addresses.
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/device/device-log-settings/select-log-forwarding-destinations --> not 100% sure if its A, but it states, that as built in actions for tagging and integration, if an Azure Subscription is present, Logs for tagged IPs can be forwarded to the Azure Sec. Center, I have not seen any info on blocking dest. IPs since this is done via security rules.
It says "can be used to accomplish". Not necessarily that it does it on its own.
Exactly!
On the 1/23/24 exam
You can tag either Source or Destination IP addresses. On the other hand, A refers to an action you can only take on VM Series firewalls on Azure.
It has options as Source address destination address user X-forwarded-For address
answer D: the built in action in log forwarding profiles only allow to tag IP addresses, users and x forwarded for IP addresses
last week's exam question
Answer is D
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-log-forwarding
I think D
Tagging - block source/destination address Integration - Azure-Security-Center-Integration https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/objects/objects-log-forwarding
You can tag 4 types of resources via those logs: User, Source Address, Destination Address (the answers), and X-forwarded for Address.