The two log types that can be configured for forwarding in 'Objects → Log Forwarding' are User-ID and WildFire. User-ID logs provide details about user activity on the network, while WildFire logs focus on malware detection. Forwarding these logs aids in enhancing network security and monitoring compliance.
;
In the context of Palo Alto Networks and their firewall systems, the forwarding of logs is typically configured in the Log Forwarding profile settings found in the 'Objects' tab. When configuring Log Forwarding, administrators can choose specific log types to forward to different destinations such as syslog servers, email, SNMP, or HTTP.
For this question, we need to determine which two log types, out of the given options, are configured in 'Objects → Log Forwarding.' Let's evaluate the options:
GlobalProtect: This is a VPN (Virtual Private Network) log type relevant to users accessing the network remotely using GlobalProtect clients, which is typically part of log forwarding settings.
User-ID: Although important for tracking user activity within the network, User-ID is not a standard log type for forwarding under 'Objects → Log Forwarding'.
WildFire: This log type refers to logs from WildFire, a Palo Alto Networks service for identifying zero-day malware and cyber threats, often included in log forwarding due to its security relevance.
Authentication: While important, authentication logs are not specifically mentioned in 'Objects → Log Forwarding.'
Therefore, the two log types configured in 'Objects → Log Forwarding' are GlobalProtect and WildFire .