Which two products can be integrated and managed by Strata Cloud Manager (SCM)? (Choose two)
Strata Cloud Manager (SCM) is Palo Alto Networks' centralized cloud-based management platform for managing network security solutions, including Prisma Access and Prisma SD-WAN. SCM can also integrate with VM-Series firewalls for managing virtualized NGFW deployments.
Why A (Prisma SD-WAN) Is Correct
SCM is the management interface for Prisma SD-WAN, enabling centralized orchestration, monitoring, and configuration of SD-WAN deployments.
Why D (VM-Series NGFW) Is Correct
SCM supports managing VM-Series NGFWs, providing centralized visibility and control for virtualized firewall deployments in cloud or on-premises environments.
Why Other Options Are Incorrect
B (Prisma Cloud): Prisma Cloud is a separate product for securing workloads in public cloud environments. It is not managed via SCM.
C (Cortex XDR): Cortex XDR is a platform for endpoint detection and response (EDR). It is managed through its own console, not SCM.
Palo Alto Networks Strata Cloud Manager Overview
A systems engineer (SE) is working with a customer that is fully cloud-deployed for all applications. The customer is interested in Palo Alto Networks NGFWs but describes the following challenges:
"Our apps are in AWS and Azure, with whom we have contracts and minimum-revenue guarantees. We would use the built-in firewall on the cloud service providers (CSPs), but the need for centralized policy management to reduce human error is more important."
Which recommendations should the SE make?
The customer is seeking centralized policy management to reduce human error while maintaining compliance with their contractual obligations to AWS and Azure. Here's the evaluation of each option:
Option A: Cloud NGFWs at both CSPs; provide the customer a license for a Panorama virtual appliance from their CSP's marketplace of choice to centrally manage the systems
Cloud NGFW is a fully managed Next-Generation Firewall service by Palo Alto Networks, offered in AWS and Azure marketplaces. It integrates natively with the CSP infrastructure, making it a good fit for customers with existing CSP agreements.
Panorama, Palo Alto Networks' centralized management solution, can be deployed as a virtual appliance in the CSP marketplace of choice, enabling centralized policy management across all NGFWs.
This option addresses the customer's need for centralized management while leveraging their existing contracts with AWS and Azure.
This option is appropriate.
Option B: Cloud NGFWs in AWS and VM-Series firewall in Azure; the customer selects a PAYG licensing Panorama deployment in their CSP of choice
This option suggests using Cloud NGFW in AWS but VM-Series firewalls in Azure. While VM-Series is a flexible virtual firewall solution, it may not align with the customer's stated preference for CSP-managed services like Cloud NGFW.
This option introduces a mix of solutions that could complicate centralized management and reduce operational efficiency.
This option is less appropriate.
Option C: VM-Series firewalls in both CSPs; manually built Panorama in the CSP of choice on a host of either type: Palo Alto Networks provides a license
VM-Series firewalls are well-suited for cloud deployments but require more manual configuration compared to Cloud NGFW.
Building a Panorama instance manually on a host increases operational overhead and does not leverage the customer's existing CSP marketplaces.
This option is less aligned with the customer's needs.
Option D: VM-Series firewall and CN-Series firewall in both CSPs; provide the customer a private-offer Panorama virtual appliance from their CSP's marketplace of choice to centrally manage the systems
This option introduces both VM-Series and CN-Series firewalls in both CSPs. While CN-Series firewalls are designed for Kubernetes environments, they may not be relevant if the customer does not specifically require container-level security.
Adding CN-Series firewalls may introduce unnecessary complexity and costs.
This option is not appropriate.
Palo Alto Networks documentation on Cloud NGFW
Panorama overview in Palo Alto Knowledge Base
VM-Series firewalls deployment guide in CSPs: Palo Alto Documentation
What are three valid Panorama deployment options? (Choose three.)
Panorama is Palo Alto Networks' centralized management solution for managing multiple firewalls. It supports multiple deployment options to suit different infrastructure needs. The valid deployment options are as follows:
Why 'As a virtual machine (ESXi, Hyper-V, KVM)' (Correct Answer A)?
Panorama can be deployed as a virtual machine on hypervisors like VMware ESXi, Microsoft Hyper-V, and KVM. This is a common option for organizations that already utilize virtualized infrastructure.
Why 'With a cloud service provider (AWS, Azure, GCP)' (Correct Answer B)?
Panorama is available for deployment in the public cloud on platforms like AWS, Microsoft Azure, and Google Cloud Platform. This allows organizations to centrally manage firewalls deployed in cloud environments.
Why 'As a dedicated hardware appliance (M-100, M-200, M-500, M-600)' (Correct Answer E)?
Panorama is available as a dedicated hardware appliance with different models (M-100, M-200, M-500, M-600) to cater to various performance and scalability requirements. This is ideal for organizations that prefer physical appliances.
Why not 'As a container (Docker, Kubernetes, OpenShift)' (Option C)?
Panorama is not currently supported as a containerized deployment. Containers are more commonly used for lightweight and ephemeral services, whereas Panorama requires a robust and persistent deployment model.
Why not 'On a Raspberry Pi (Model 4, Model 400, Model 5)' (Option D)?
Panorama cannot be deployed on low-powered hardware like Raspberry Pi. The system requirements for Panorama far exceed the capabilities of Raspberry Pi hardware.
In addition to DNS Security, which three Cloud-Delivered Security Services (CDSS) subscriptions are minimum recommendations for all NGFWs that handle north-south traffic? (Choose three)
North-south traffic refers to the flow of data in and out of a network, typically between internal resources and the internet. To secure this type of traffic, Palo Alto Networks recommends specific CDSS subscriptions in addition to DNS Security:
A . SaaS Security
SaaS Security is designed for monitoring and securing SaaS application usage but is not essential for handling typical north-south traffic.
B . Advanced WildFire
Advanced WildFire provides cloud-based malware analysis and sandboxing to detect and block zero-day threats. It is a critical component for securing north-south traffic against advanced malware.
C . Enterprise DLP
Enterprise DLP focuses on data loss prevention, primarily for protecting sensitive data. While important, it is not a minimum recommendation for securing north-south traffic.
D . Advanced Threat Prevention
Advanced Threat Prevention (ATP) replaces traditional IPS and provides inline detection and prevention of evasive threats in north-south traffic. It is a crucial recommendation for protecting against sophisticated threats.
E . Advanced URL Filtering
Advanced URL Filtering prevents access to malicious or harmful URLs. It complements DNS Security to provide comprehensive web protection for north-south traffic.
Key Takeaways:
Advanced WildFire, Advanced Threat Prevention, and Advanced URL Filtering are minimum recommendations for NGFWs handling north-south traffic, alongside DNS Security.
SaaS Security and Enterprise DLP, while valuable, are not minimum requirements for this use case.
Palo Alto Networks NGFW Best Practices
Cloud-Delivered Security Services
The PAN-OS User-ID integrated agent is included with PAN-OS software and comes in which two forms? (Choose two.)
User-ID is a feature in PAN-OS that maps IP addresses to usernames by integrating with various directory services (e.g., Active Directory). User-ID can be implemented through agents provided by Palo Alto Networks. Here's how each option applies:
Option A: Integrated agent
The integrated User-ID agent is built into PAN-OS and does not require an external agent installation. It is configured directly on the firewall and integrates with directory services to retrieve user information.
This is correct.
Option B: GlobalProtect agent
GlobalProtect is Palo Alto Networks' VPN solution and does not function as a User-ID agent. While it can be used to authenticate users and provide visibility, it is not categorized as a User-ID agent.
This is incorrect.
Option C: Windows-based agent
The Windows-based User-ID agent is a standalone agent installed on a Windows server. It collects user mapping information from directory services and sends it to the firewall.
This is correct.
Option D: Cloud Identity Engine (CIE)
The Cloud Identity Engine provides identity services in a cloud-native manner but is not a User-ID agent. It synchronizes with identity providers like Azure AD and Okta.
This is incorrect.
Palo Alto Networks documentation on User-ID
Knowledge Base article on User-ID Agent Options
Karrie
3 days agoKristin
18 days agoVivan
22 days agoLoren
1 months agoAntione
2 months agoGerman
2 months agoHaydee
2 months agoGlenna
3 months agoChantell
3 months agoWilda
3 months ago