Knowledge Quiz 14 - Basic User-ID
When employing User-ID with Windows Server 2008 or later as Domain Controllers (DCs), an Active DIrectory (AD) account must be created for the firewall agent with the privilege level of at least _____.
***NOT Domain Users ***NOT WMI Users
If the User-ID agent has the proper rights to the DC's _________ log, it can read the recorded Username and IP address of successful login events.
Security
______ is a method that can be used by User-ID to find user and group information and to map those users to session source IP address(es). (Choose all that Apply)
Server Monitoring Client Probing Syslog Captive Portal
The two forms of the User-ID agent are the ________ and the ___________. (Choose all that Apply)
Standalone Software agent PAN-OS agent resident on the firewall
Port mapping for Windows/Citrix terminal servers
Terminal Services agent
Novell's LDAP Directory service
eDirectory
The User-ID agent using Server Monitoring can be using with Apple Open Directory servers and 802.1x devices.
False
When enforcing firewall policies, User-ID only identifies the user on the network and not the IP addresses of the computer the user is logged in to.
False
Gathers a list of available users and their groups from the LDAP Server
Group Mapping
User-ID can retrieve user and group information from a(n) _______.
LDAP Directory
User-ID provides full visibility of a user's network activities except when they are using which of the following devices to access the network.
None of the Above
Once User-ID is configured, user data appears as a column or a filter condition in the ______ logs. (Choose all that Apply)
Traffic Threat URL Filtering Data Filtering
Each User-ID agent, regardless of the type, can only monitor users and DCs from a single AD domain.
True
One benefit of User-ID is unknown users can be handled differently from known users to accommodate network guests.
True
One goal of the User-ID feature is to identifies the user by username and user groups instead of IP addresses and ports on the computer the user is logged into when enforcing firewall policies.
True
Maps the IP address of traffic to a username using a User-ID agent
User Mapping
Examines the client machine's locally maintained login information
WMI Probe