An enterprise Information Security team has deployed policies based on AD groups to restrict user access to critical infrastructure systems. However, a recent phishing campaign against the organization has prompted information Security to look for more controls that can secure access to critical assets. For users that need to access these systems, Information Security wants to use PAN-OS multi-factor authentication (MFA) integration to enforce MFA.
What should the enterprise do to use PAN-OS MFA?
- Use a Credential Phishing agent to detect, prevent, and mitigate credential phishing campaigns.
- Create an authentication profile and assign another authentication factor to be used by a Captive Portal authentication policy.
- Configure a Captive Portal authentication policy that uses an authentication sequence.
- Configure a Captive Portal authentication policy that uses an authentication profile that references a RADIUS profile.
Reveal Solution Next Question