Forwarding of which two log types is configured in Device > Log Settings? (Choose two.)
A. Threat
B. HIP Match
C. Traffic
D. Configuration
Explanation:
Based on PAN-OS 11.0 documentation, the forwarding configuration for
specific log types in Device > Log Settings involves selecting log types for system-level
logs, which include HIP Match and Configuration logs.
Explanation for Each Option
A. Threat
Refer to Exhibit:
A. Option A
B. Option B
C. Option C
D. Option D
Explanation:
Scenario Recap
Panorama is being used to manage policies and templates.
The administrator is creating a policy, but the zone dropdown does not include the required zone.
This usually means Panorama does not have zone information available — and that happens when a firewall is not properly linked to both the device group (policies) and the template (zones/interfaces).
Breakdown
Diagram & Panorama Settings
Shows Panorama managing multiple firewalls.
Timeout and commit synchronization settings.
Security Policy Rule
When creating rules, zone selection should appear.
But the required zone is not listed → root issue.
Objects / Zones Configuration
Shows configured security zones.
These zones must come from a firewall that belongs to both device group + template.
Panorama Settings – Share Options
Shows “Share Unused Address and Service Objects with Devices” setting.
This only impacts unused objects sync, not zone availability.
✅ Correct Answer
The missing zones issue is because no firewall is yet added to both the device group and template.
👉 The correct choice is:
D. Add a firewall to both the device group and the template
❌ Why not the others?
A. Specify master device
→ helps Panorama know which device’s zones/VRs to use if multiple firewalls exist, but if the firewall isn’t in both DG + template, it won’t even show.
B. Share unused objects
→ unrelated to zones.
C. Reference template
→ allows object reference from another template, but still requires a firewall in both DG + template.
An administrator plans to install the Windows-Based User-ID Agent to prevent credential phishing. Which installer package file should the administrator download from the support site?
A. UaCredlnstall64-11.0.0.msi
B. GlobalProtect64-6.2.1.msi
C. Talnstall-11.0.0.msi
D. Ualnstall-11.0.0msi
Explanation:
This question tests your knowledge of the specific components involved in deploying the User-ID agent and their purpose, particularly for mitigating credential phishing.
1. The Goal: Prevent Credential Phishing
The key phrase is "prevent credential phishing." The standard User-ID agent collects IP-to-username mappings. To actively prevent phishing, you need an agent that can also intercept and block authentication attempts to unauthorized sites. This is the job of the Credential Theft Protection feature.
2. The Components: User-ID Agent vs. Credential Theft Add-on
The Windows-Based User-ID Agent consists of two main parts:
1.Core User-ID Agent (UaInstall-*.msi):
This is the base agent. Its primary function is to gather user information from Windows systems (via WMI or NetAPI) and report IP-to-username mappings back to the firewall. It helps in identifying users for policy enforcement but does not actively prevent phishing on its own.
2.Credential Theft Add-on (UaCredInstall-*.msi):
This is an additional package that installs on top of the core User-ID agent. It enables the Credential Theft Protection feature. This add-on:
Monitors system for authentication events (e.g., when a user enters a password).
Checks the target of the authentication against a list of known legitimate domains configured on the firewall.
Blocks the authentication attempt if the target domain is not authorized, thereby preventing the user from accidentally submitting their credentials to a phishing site.
3. Why the Correct Answer is A
A. UaCredInstall64-11.0.0.msi
This is the installer for the Credential Theft Add-on (UaCredInstall).
The 64 indicates the 64-bit version.
The 11.0.0 indicates the version, which should match the version of PAN-OS or be compatible as per the compatibility matrix.
Installing this package on Windows endpoints is the direct method to enable the feature that prevents credential phishing.
4. Why the Other Options Are Incorrect
B. GlobalProtect64-6.2.1.msi
Incorrect. This is the installer for the GlobalProtect VPN client. While GlobalProtect can also perform Host Information Profile (HIP) checks and enforce security policy, it is not the specific agent used for Credential Theft Protection. Its primary function is providing remote access and endpoint compliance.
C. Talnstall-11.0.0.msi
Incorrect. This is a distractor. There is no official Palo Alto Networks agent with this naming convention. The correct prefix for the core agent is UaInstall (User-ID Agent Install).
D. Ualnstall-11.0.0.msi
Incorrect. This is the installer for the core User-ID Agent (UaInstall). While this agent is required as a prerequisite for the Credential Theft Add-on, it does not, by itself, provide the credential phishing prevention functionality. The question specifically asks for the agent to "prevent credential phishing," which requires the add-on package.
Reference and Key Concepts for the PCNSE Exam:
Feature Name:
Remember the name Credential Theft Protection. It is a key feature tied to the User-ID agent.
Deployment Order: To deploy this, you must:
First, install the core User-ID agent (UaInstall-*.msi).
Second, install the Credential Theft Add-on (UaCredInstall-*.msi) on the same systems.
Firewall Configuration:
Simply installing the agent is not enough. You must also configure the feature on the firewall under Device > User Identification > Credential Theft Prevention by adding allowed domains and creating a security policy to block credential theft.
Documentation:
The official Palo Alto Networks documentation always refers to the add-on installer as the "Credential Theft Prevention component" or the UaCredInstall package.
A firewall administrator has been tasked with ensuring that all firewalls forward System logs to Panorama. In which section is this configured?
A. Monitor > Logs > System
B. Objects > Log Forwarding
C. Panorama > Managed Devices
D. Device > Log Settings
Explanation:
A firewall administrator has been tasked with ensuring that all firewalls forward System logs to Panorama for centralized monitoring and management. In a Palo Alto Networks environment, log forwarding is configured to send specific log types, such as System logs (which record operational events like system startups, HA status changes, or errors), to Panorama or other external destinations. The Device > Log Settings section is where administrators enable and filter log types for forwarding, including System logs. Within this section, the administrator can select the System log type, apply a filter if needed (e.g., to capture specific events), and link it to a Log Forwarding profile that directs logs to Panorama. The Palo Alto Networks PAN-OS 11.1 Administrator’s Guide specifies that log forwarding configuration, including for Panorama, is managed under Device >
Why Other Options Are Incorrect:
A. Monitor > Logs > System:
This section displays System logs for viewing but does not configure forwarding. It is for monitoring, not setup. The PCNSE Study Guide notes it is a read-only interface.
B. Objects > Log Forwarding:
This section defines Log Forwarding profiles (e.g., specifying Panorama as a destination), but it does not enable or filter log types for forwarding. It works in conjunction with Device > Log Settings. The PAN-OS 11.1 Administrator’s Guide clarifies its role as a profile creation tool.
C. Panorama > Managed Devices:
This section manages firewall associations with Panorama (e.g., adding serial numbers) but does not configure log forwarding settings. It is for device management, not log configuration. The PCNSE Study Guide distinguishes its purpose.
Practical Steps:
Log in to each firewall’s web interface.
Navigate to Device > Log Settings.
Select the System log type.
Check the box to enable forwarding.
Add a filter if needed (e.g., (eventid eq ha-event) for HA-related logs).
Create or select a Log Forwarding profile under Objects > Log Forwarding, specifying Panorama as the destination (e.g., via IP or hostname under Panorama > Setup > Management).
Link the profile to the System log settings.
Commit the configuration on each firewall.
Verify logs in Panorama under Monitor > System Logs.
Additional Considerations:
Ensure Panorama is configured to receive logs (e.g., via Panorama > Setup > Management).
Check connectivity between firewalls and Panorama.
As of the current date and time, PAN-OS 11.1 supports this configuration by default.
References:
Palo Alto Networks PAN-OS 11.1 Administrator’s Guide:
Details log forwarding setup in Device > Log Settings.
Palo Alto Networks PCNSE Study Guide:
Explains forwarding System logs to Panorama.
A network security administrator has been tasked with deploying User-ID in their organization. What are three valid methods of collecting User-ID information in a network? (Choose three.)
A. Windows User-ID agent
B. GlobalProtect
C. XMLAPI
D. External dynamic list
E. Dynamic user groups
Explanation:
User-ID is a core Palo Alto Networks feature that maps user identities to IP addresses, enabling the firewall to enforce security policies based on who the user is, rather than just their IP address. This information is collected in a number of ways to ensure accuracy and comprehensive coverage.
A. Windows User-ID agent:
This agent is installed on a Windows server (typically a domain controller) and monitors security event logs for successful user logins. The agent extracts the username and associated IP address from the logs and sends this mapping to the Palo Alto Networks firewall. This is one of the most common and effective methods for collecting User-ID information in an Active Directory environment.
B. GlobalProtect:
When a user connects to the network using the GlobalProtect VPN client, the client provides the user's identity to the firewall. The firewall then creates a user-to-IP mapping based on this information. This method is particularly useful for remote and mobile users.
C. XMLAPI:
This is a flexible, programmatic method for collecting and sending user-to-IP mappings to the firewall. An administrator can use the XMLAPI to integrate with third-party authentication systems, or with custom scripts, to send user mapping information to the firewall.
Why the Other Options Are Incorrect
D. External dynamic list:
External dynamic lists (EDLs) are used to import a list of IP addresses or URLs from an external source and use them in security policies. They are not a method for collecting User-ID (username-to-IP) information.
E. Dynamic user groups:
Dynamic user groups (DUGs) are a way to use the collected User-ID information to automatically group users based on tags or LDAP attributes. They are a feature that consumes User-ID data, but they do not collect the data themselves. They rely on other methods like the User-ID agent or GlobalProtect to get the initial user-to-IP mapping.
An administrator needs to evaluate a recent policy change that was committed and pushed to a firewall device group. How should the administrator identify the configuration changes?
A. Click Preview Changes under Push Scope
B. Use Test Policy Match to review the policies in Panorama
C. Review the configuration logs on the Monitor tab
D. Context-switch to the affected firewall and use the configuration audit tool
Explanation:
To evaluate a recent policy change that was committed and pushed to a firewall device group, the administrator should review the configuration logs. These logs capture all changes made to the firewall configuration, including policy updates, object modifications, and commit actions.
1.You can find these logs in:
Monitor > Logs > Configuration
2.This view shows:
Who made the change
What was changed
When it was committed
The commit status and scope
This is the most direct and authoritative way to audit configuration changes after a push from Panorama.
❌ Why Other Options Are Incorrect:
A. Click Preview Changes under Push Scope This shows pending changes before a push, not after.
B. Use Test Policy Match to review the policies in Panorama This helps validate policy behavior for traffic, but doesn’t show change history.
DContext-switch to the affected firewall and use the configuration audit tool This compares config versions locally, but is less efficient than using Panorama’s centralized logs.
🔗 Authoritative Reference:
Exam4Training PCNSE Question
Which are valid ACC GlobalProtect Activity tab widgets? (Choose two.)
A. Successful GlobalProtect Deployed Activity
B. GlobalProtect Deployment Activity
C. GlobalProtect Quarantine Activity
D. Successful GlobalProtect Connection Activity
Explanation:
The ACC (Application Command Center) is a powerful visualization tool in PAN-OS. The GlobalProtect Activity tab is specifically designed to monitor the status and health of GlobalProtect deployments, including both client deployment (installation) and connection success.
Analyzing the Valid Widgets:
Why Option B (GlobalProtect Deployment Activity) is Correct:
This widget tracks the installation and deployment status of the GlobalProtect client software on endpoints.
It provides visibility into how many clients have been successfully deployed versus how many have failed or are pending deployment. This is crucial for administrators to ensure their remote workforce has the necessary client installed to establish VPN connections.
Why Option D (Successful GlobalProtect Connection Activity) is Correct:
This widget visualizes the number of successful VPN tunnel establishments over time.
It helps administrators confirm that deployed clients are able to successfully authenticate and connect to the GlobalProtect gateway. A sudden drop in this graph would indicate a potential connectivity or authentication issue affecting users.
Why the Other Options Are Incorrect:
Why Option A (Successful GlobalProtect Deployed Activity) is Incorrect:
This is a distractor and not a valid widget name. While it combines words from the correct options, the accurate widget for tracking client installation is GlobalProtect Deployment Activity (Option B), which shows both successful and failed deployment attempts.
Why Option C (GlobalProtect Quarantine Activity) is Incorrect:
Quarantine is a function of Cortex XDR (or the Traps legacy product), not a primary function visualized in the ACC's GlobalProtect tab.
The ACC's GlobalProtect tab is focused on connectivity and deployment metrics. While GlobalProtect can interact with quarantine policies (e.g., by providing HIP data), there is no dedicated "Quarantine Activity" widget within the standard GlobalProtect Activity view in ACC.
Reference and Key Concepts for the PCNSE Exam:
ACC Purpose: Remember that the ACC is for real-time and historical traffic and threat visualization. The GlobalProtect tab is a specialized view within it.
Key Widgets: The two main categories of GlobalProtect monitoring are:
1.Deployment: Ensuring the client software is on the endpoint (GlobalProtect Deployment Activity).
2.Connectivity: Ensuring the client can successfully建立 tunnels (Successful GlobalProtect Connection Activity).
GUI Path: You can access the ACC and this tab by navigating to Monitor > ACC and then selecting the GlobalProtect tab.
<
In a template, which two objects can be configured? (Choose two.)
A. SD-WAN path quality profile
B. Monitor profile
C. IPsec tunnel
D. Application group
Explanation:
In PAN-OS, a template is used to configure device-specific settings such as interfaces, zones, routing, and system-level objects. Among the options listed, the following two are valid objects that can be configured within a template:
✅ B. Monitor profile
Monitor profiles are used for link monitoring, tunnel monitoring, and other health checks.
These are configured under Network > Network Profiles > Monitor in the template.
They are essential for high availability and VPN reliability.
✅ C. IPsec tunnel
IPsec tunnels are configured under Network > IPSec Tunnels in the template.
Templates allow centralized configuration of tunnel interfaces, crypto profiles, and peer settings.
This is a core use case for Panorama templates.
❌ Why A and D Are Incorrect:
A. SD-WAN path quality profile SD-WAN profiles are configured in SD-WAN templates, which are separate from standard Panorama templates. They require SD-WAN licensing and are managed differently.
D. Application group Application groups are part of security policy objects, which are managed in device groups, not templates.
🔗 Authoritative Reference:
Palo Alto Networks TechDocs: Templates Overview
PCNSE Practice Guide
An engineer is configuring secure web access (HTTPS) to a Palo Alto Networks firewall for management. Which profile should be configured to ensure that management access via web browsers is encrypted with a trusted certificate?
A. An SSL/TLS Service profile with a certificate assigned.
B. An Interface Management profile with HTTP and HTTPS enabled.
C. A Certificate profile with a trusted root CA.
D. An Authentication profile with the allow list of users.
Explanation:
To ensure that management access to a Palo Alto Networks firewall via HTTPS is secure and uses a trusted certificate, you need to configure an SSL/TLS Service profile. This profile is the central object that ties a certificate to a service requiring encryption, such as the web interface for management, SSL Forward Proxy, or GlobalProtect.
SSL/TLS Service Profile:
This profile is where you specify the server certificate that the firewall will present to a web browser during the TLS handshake. This certificate must be signed by a trusted Certificate Authority (CA) or be a self-signed certificate that has been imported and trusted by the client. The profile also allows you to define the accepted SSL/TLS protocols and ciphers.
The configured SSL/TLS Service Profile is then assigned to the management interface.
Why the Other Options Are Incorrect
B. An Interface Management profile with HTTP and HTTPS enabled:
The Interface Management profile specifies which services (HTTP, HTTPS, SSH, etc.) are allowed on an interface. While you would enable HTTPS here, this profile does not contain the certificate. It simply permits the service to run on the interface. The security of the HTTPS connection is defined by the SSL/TLS Service profile.
C. A Certificate profile with a trusted root CA:
A Certificate profile is used to validate the certificates of other devices, not to assign a certificate for the firewall's own management. For example, it's used for validating certificates in SSL Inbound Inspection or for verifying the client certificates in a VPN connection. It defines the trusted CAs that the firewall will use to verify incoming certificates.
D. An Authentication profile with the allow list of users:
An Authentication profile defines the authentication method (e.g., LDAP, RADIUS, SAML) and user list for managing access to the firewall. It handles the who but not the how (the encryption method). While essential for secure management, it's a separate step from configuring the certificate for the HTTPS session.
Which template values will be configured on the firewall if each template has an SSL to be deployed. The template stack should consist of four templates arranged according to the diagram. Which template values will be configured on the firewall if each template has an SSL/TLS Service profile configured named Management?
A. Values in Datacenter
B. Values in efwOlab.chi
C. Values in Global Settings
D. Values in Chicago
Explanation:
In Panorama, when multiple templates are combined into a template stack, the firewall inherits configuration values based on template priority. The template at the top of the stack has the highest precedence, and its values override those in lower-priority templates if the same object (e.g., SSL/TLS Service profile named "Management") is defined in multiple templates.
According to the retrieved reference:
"The firewall will inherit the settings from the highest priority template that has the setting configured, and ignore the settings from the lower priority templates that have the same setting configured."
So, if all four templates in the stack (Global Settings, Datacenter, efwOlab.chi, and Chicago) define an SSL/TLS Service profile named Management, the firewall will use the version from the Chicago template—assuming it is highest in the stack.
🔗 Authoritative Reference:
Palo Alto Networks TechDocs: Templates and Template Stacks
Cramkey PCNSE Lab Discussion: SSL/TLS Profile Inheritance
An administrator has purchased WildFire subscriptions for 90 firewalls globally. What should the administrator consider with regards to the WildFire infra-structure?
A. To comply with data privacy regulations, WildFire signatures and ver-dicts are not shared globally.
B. Palo Alto Networks owns and maintains one global cloud and four WildFire regional clouds.
C. Each WildFire cloud analyzes samples and generates malware signatures and verdicts independently of the other WildFire clouds.
D. The WildFire Global Cloud only provides bare metal analysis
Explanation:
This question tests your understanding of the WildFire cloud infrastructure's global deployment model, which is a critical consideration for data privacy and compliance (like GDPR, CCPA, etc.) when deploying firewalls across different countries or regions.
The Core Concept: Global vs. Regional Clouds
Palo Alto Networks operates a multi-cloud WildFire infrastructure to serve a global customer base:
WildFire Global Cloud: This is the primary, central cloud located in the United States.
WildFire Regional Clouds: To address data sovereignty and latency concerns, Palo Alto Networks has deployed regional clouds in other geographic locations. The standard configuration includes:
United States (the global cloud also serves as the US regional cloud)
Europe (typically refers to a cloud located within the EU)
Australia
Japan
Canada (often mentioned as well, expanding beyond the classic four)
Why the Correct Answer is B
B. Palo Alto Networks owns and maintains one global cloud and four WildFire regional clouds.
This statement accurately describes the distributed nature of the WildFire infrastructure. The "global cloud" is the central authority, but the "regional clouds" allow organizations to keep their submitted files and data within a specific geographic or political boundary to comply with local data privacy laws.
Why the Other Options Are Incorrect
A. To comply with data privacy regulations, WildFire signatures and verdicts are not shared globally.
Incorrect. This is the opposite of how WildFire operates. The entire power of the WildFire system is its global intelligence sharing. Once a sample is analyzed in any cloud (global or regional), the resulting signature and verdict are promptly shared with all WildFire clouds worldwide. This ensures that a threat discovered in Japan is blocked minutes later for a customer in Brazil, providing collective defense. The samples themselves (the actual files) may stay within a regional cloud for privacy, but the protective intelligence is global.
C. Each WildFire cloud analyzes samples and generates malware signatures and verdicts independently of the other WildFire clouds.
Incorrect. While each cloud can perform analysis, they are not independent silos. The regional clouds are connected to the global cloud. The global cloud acts as the central coordination point to ensure consistency and to disseminate intelligence. This ensures all customers benefit from the same level of protection regardless of which cloud their firewall uses.
D. The WildFire Global Cloud only provides bare metal analysis.
Incorrect. The WildFire cloud uses a sophisticated blend of analysis environments, including:
Virtualized Analysis: For rapid scalability and analysis of most common file types.
Bare-Metal Analysis: For sophisticated malware that can detect and evade virtualized environments.
Static Analysis: To quickly identify malicious indicators without full execution.
The global cloud provides this full range of techniques; it is not limited to only bare metal analysis. Furthermore, regional clouds also leverage this multi-method approach.
Reference and Key Concepts for the PCNSE Exam:
Key Benefit of Regional Clouds: The primary reason to choose a regional cloud is to comply with data residency or data sovereignty laws that mandate certain types of data must not leave a specific country or region (e.g., the European Union).
Configuration: An administrator can configure which WildFire cloud a firewall uses. This is done under Device > Setup > WildFire by selecting the appropriate WildFire Cloud Location (e.g., US, Europe, Australia, Japan).
Intelligence Sharing is Global: The most important takeaway is the distinction between data residency (where the file sample is stored) and intelligence sharing (where the verdict is known). Samples may stay regionally, but verdicts are shared globally to protect all customers.
Default Setting: If no specific regional cloud is selected, the firewall will use the global cloud.
After switching to a different WAN connection, users have reported that various websites
will not load, and timeouts are occurring. The web servers work fine from other locations.
The firewall engineer discovers that some return traffic from these web servers is not
reaching the users behind the firewall. The engineer later concludes that the maximum
transmission unit (MTU) on an upstream router interface is set to 1400 bytes.
The engineer reviews the following CLI output for ethernet1/1.
Which setting should be modified on ethernet1/1 to remedy this problem?
A. Lower the interface MTU value below 1500.
B. Enable the Ignore IPv4 Don't Fragment (DF) setting.
C. Change the subnet mask from /23 to /24.
D. Adjust the TCP maximum segment size (MSS) value.
Explanation:
The issue arises because the upstream router’s MTU is set to 1400 bytes, while the firewall interface (ethernet1/1) likely defaults to an MTU of 1500 bytes. This mismatch causes packet fragmentation or drops, especially when the Don't Fragment (DF) bit is set in IP headers—common in TCP traffic.
To resolve this without changing the upstream router or firewall MTU, the best solution is to:
✅ Adjust the TCP MSS value
MSS (Maximum Segment Size) defines the largest TCP payload that can be sent without fragmentation.
By lowering the MSS to account for the upstream MTU (e.g., set MSS to 1360 or lower), you ensure that TCP packets stay within the 1400-byte limit.
This avoids fragmentation and ensures reliable delivery of return traffic from web servers.
❌ Why Other Options Are Incorrect:
A. Lower the interface MTU value below 1500 This could help, but it affects all traffic and may not be necessary if MSS adjustment solves the issue more cleanly.
B. Enable the Ignore IPv4 Don't Fragment (DF) setting This allows fragmented packets through but doesn’t prevent fragmentation or packet drops upstream.
C. Change the subnet mask from /23 to /24 Irrelevant to MTU or packet fragmentation. This affects routing, not packet size.
🔗 Authoritative References:
Pass4Success PCNSE Question Discussion
Palo Alto Networks KB: When to Use Adjust MSS
Page 12 out of 27 Pages |
Previous |