The SLR reports deliver actionable insights into the cloud applications and
workloads discovered in your cloud environment.
You can view and download
the SLR report (in PDF format), delete it, and re-download the existing SLR reports
fromStrata Cloud Manager.
Log in to Strata Cloud Manager.
Navigate to Insights Prisma AIRS Prisma AIRS AI Runtime: Network intercept.
Click the report icon that reads Download SLR Report as indicated in the
image below.
The dashboard stores the report templates, the scheduled reports, and the
generated reports.
Report Templates
The "Report Templates" tab view shows a list of SLR reports, with the following details:
Report name.
Report Category is based on the SLR deployment type you chose
while deploying SLR.
Description of the report.
Actions allow you to:
Download the report in PDF format.
Share the report in an email. Enter a single email
address or a list of comma-separated email addresses and select
Share.
Schedule automated report sharing:
Time Interval: Specify the time range for data
(for example, past 24 hours or the past 7 days) to be
included in your automated email reports.
Start Date: Select a date to start sending the
reports.
Frequency: Select how frequently you want to send
the reports.
At: Set the time to send out the report.
Share with: Enter the email addresses of the
recipients.
Click Schedule.
Scheduled Reports
View and manage your scheduled reports in the “Scheduled Reports” tab. You can
delete or edit a report schedule, update the start date, frequency of report
generation, and the email address with whom you want to share the report.
Click Save to update the report schedule.
History
The reports “History” tab stores a list of reports, along with the time
the report was generated, by which user, the report name, and the status, such
as if the report was successfully downloaded, if it was shared, or if the report
failed to generate.
Use the download button under “Actions” to download an SLR report for
analysis.
SLR Report Details
The SLR report summarizes the traffic to and from your discovered workloads,
types of content, potential threats, and actionable actions to mitigate the
risk.
Key highlights:
Breakdown of application workloads based on region.
High-risk applications: application workloads communicating with unsafe
internet destinations.
Application inventory: Graphical representation of the application
inventory, including VMs, serverless, and container workloads per
hour.
Top five or ten applications based on usage and traffic flow (ingress
and egress).