A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources.
Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?
A . The Automated Correlation Engine
B . Cortex XDR and Cortex Data Lake
C . WildFire with API calls for automation
D . 3rd Party SIEM which can ingest NGFW logs and perform event correlation
Answer: A
Explanation:
Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/use-the-automated-correlation-engine.html
Latest PSE Strata Dumps Valid Version with 62 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund