While static user groups mapped from directory services (like AD/LDAP) are fundamental for role-based access control, Dynamic User Groups (DUGs) in PAN-OS provide a powerful layer of context-aware security . DUGs allow you to group users based on dynamic attributes or states—represented by tags associated with their User-ID mapping—rather than solely on their relatively fixed position in an organizational chart.
This enables policies that adapt to changing conditions, such as device compliance, user behavior anomalies, or threat intelligence, without requiring manual intervention or complex static group management.
Objects > Dynamic User Groups
):
A DUG is defined by specifying one or more tags as
Match Criteria
. Logical AND/OR operators can be used.
Objects > Dynamic User Groups
, specifying the tag match criteria.
For the PCNSE exam, regarding Dynamic User Groups:
Objects > Dynamic User Groups
) and how they match (based on tags).
1. What determines membership in a PAN-OS Dynamic User Group (DUG)?
2. Which is a primary, built-in mechanism for automatically assigning tags to User-ID mappings for use with DUGs?
3. How are Dynamic User Groups typically used in firewall policies?
4. What is a key benefit of using DUGs compared to relying solely on static AD groups for policy?
5. If an external Security Orchestration, Automation, and Response (SOAR) platform needs to dynamically place a user into a restricted access group on the firewall, which mechanism would it typically use?
6. Where are Dynamic User Group objects defined in the PAN-OS GUI?
7. What is the relationship between DUGs and static group mapping from AD/LDAP?
8. The effectiveness and accuracy of a DUG based on HIP compliance directly depends on:
9. What underlying mechanism links a user's session to a Dynamic User Group?
10. A feature allows the firewall to automatically add or remove tags based on events found in logs like Threat, URL, or WildFire. What is this feature called?