An internal audit team has requested additional information to be included inside traffic logs forwarded from Palo Alto Networks firewalls to an interal syslog server. Where can the firewall engineer define the data to be added into each forwarded log?
What are three prerequisites for credential phishing prevention to function? (Choose three.)
An engineer needs to collect User-ID mappings from the company’s existing proxies. What two methods can be used to pull this data from third-party proxies? (Choose two)
How can Panorama help with troubleshooting problems such as high CPU or resource exhaustion on a managed firewall?