A user complains that he cannot access the Internet. You check the logs and find that he is not authenticated. Next, you check the firewall to see if the user is a known identity. What command would you use?
Using Event Viewer in SmartEvent, a Security Administrator discovers that the Application Blade has detected three applications: YouTube, Tor, and PC in IE. Of these three applications, which would be considered the most dangerous?
As a Security Administrator, if you wanted to make rules that apply to an access role as well as an application, what would need to be enabled on the Security Gateway?
For troubleshooting purposes, Shira needs to check the currently identified users on the gateway. Which CLI command shows all users/machines and all the activity records associated with them?