View all questions & answers for the Palo Alto Security Service Edge Engineer Exam Materials exam


Question 5 Discussion

A customer using Prisma Access (Managed by Panorama) wants to monitor traffic patterns across all remote networks and use Strata Logging Service to gather insights on network usage. An engineer notices that some network data is missing from the Application Command Center (ACC). What should the engineer do to ensure complete data visibility? (Choose one answer)

  • A. Reconfigure the Prisma Access remote networks to log directly to Panorama instead of using Strata Logging Service.
  • B. Verify that the Panorama web interface has been configured to aggregate logs from both the Panorama data and RN-SPNs.
  • C. Enable the “Use Data for Pre-Defined Reports” setting in the Logging and Reporting configuration on Panorama.
  • D. Ensure that log forwarding profiles are applied to all Prisma Access policies and directed to Strata Logging Service.
Correct Answer: D

Brave-Dump Clients Votes

D 100%

Comments



Anonymous User 2026-02-26 15:56:37

Selected Answers: D


The correct answer is
D. Ensure that log forwarding profiles are applied to all Prisma Access policies and directed to Strata Logging Service.

Why Option D Is Correct
In a Prisma Access (Managed by Panorama) deployment, the Prisma Access infrastructure forwards all logs to Strata Logging Service, and Panorama then retrieves those logs to populate the ACC and generate reports. However, this log flow only works if log forwarding profiles are explicitly created, configured to use Panorama/Strata Logging Service as the Forward Method, and then attached to each security policy rule.

Without log forwarding profiles applied to every Prisma Access policy, traffic matched by those rules will not generate logs that reach Strata Logging Service — leaving the ACC with incomplete or missing data. The official workflow requires:


Go to Objects > Log Forwarding in the Remote Network Device Group

Create a Log Forwarding profile with each desired Log Type (Traffic, Threat, URL, WildFire, etc.)

Select Panorama/Strata Logging Service as the Forward Method

Apply that profile to each Security Policy rule under Actions

Commit and push to Prisma Access

Key Takeaway
The most common root cause of missing ACC data in Prisma Access (Managed by Panorama) is policies that have no log forwarding profile attached, meaning sessions are processed but never logged to Strata Logging Service. Without that profile linking policies → Strata Logging Service → Panorama, the ACC will appear incomplete despite the infrastructure being correctly licensed and configured.