An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted information Security to look for more controls that can secure access to critical assets. For users that need to access these systems, Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MFA.
What should the enterprise do to use PAN-OS MFA?
homersimpson
Highly Voted 3 years, 4 months agoJRKhan
Highly Voted 1 year, 4 months agojeremykebir
10 months, 3 weeks agoNicoara
Most Recent 9 months, 1 week ago443Annny
4 months, 3 weeks agoWhizdhum
1 year, 5 months agoEiffelsturm
1 year, 5 months agoGabranch
1 year, 5 months agogc999
1 year, 6 months agojosephrahul
1 year, 10 months agodgonz
1 year, 10 months agoTechn
1 year, 10 months agoericli87
2 years, 1 month agoPochex
2 years, 2 months agoFrightened_Acrobat
2 years, 2 months agomagicbr3
1 year, 4 months agomohr22
2 years, 3 months agoTAKUM1y
2 years, 5 months agoscally
2 years, 8 months agoUFanat
2 years, 11 months agoMarcyy
3 years, 5 months agohomersimpson
3 years, 4 months agoShenanigans123
3 years, 1 month agoGngogh
2 years, 7 months agoGivemeMoney
3 years, 3 months ago