Home
EN
Location
Documentation Home
Palo Alto Networks
Support
Live Community
Knowledge Base
MENU
Home
AIOps for NGFW
Security Posture
Document:
AIOps for NGFW
Security Posture
Download PDF
Last Updated:
Jun 10, 2022
Table of Contents
Search the Table of Contents
copyright
copyright
Get Started with AIOps for NGFW
AIOps for NGFW
AIOps for NGFW and Device Telemetry
Free and Premium Features
Onboard Devices to AIOps for NGFW
Activate AIOps for NGFW (Free)
Activate AIOps for NGFW (Premium)
AIOps Plugin for Panorama
Domains Required for AIOps for NGFW
Summary
View Most Critical Devices and Alerts
Navigate AIOps for NGFW from the Summary Dashboard
Insights
Visualize Your Devices
View Device Details
Alerts
What is an Alert?
Manage Your Alerts
View Alert Details
Forecast and Anomaly Alerts
AIOps for NGFW Alert Reference
Security Posture
Monitor Feature Adoption
Monitor Feature Configuration
Configure Security Checks
Proactively Enforce Security Checks
Assess Vulnerabilities
Activity
Settings
Get Alert Notifications
Configure User Settings
Release Updates
What’s New in AIOps for NGFW
copyright
copyright
Get Started with AIOps for NGFW
AIOps for NGFW
AIOps for NGFW and Device Telemetry
Free and Premium Features
Onboard Devices to AIOps for NGFW
Activate AIOps for NGFW (Free)
Activate AIOps for NGFW (Premium)
AIOps Plugin for Panorama
Domains Required for AIOps for NGFW
Summary
View Most Critical Devices and Alerts
Navigate AIOps for NGFW from the Summary Dashboard
Insights
Visualize Your Devices
View Device Details
Alerts
What is an Alert?
Manage Your Alerts
View Alert Details
Forecast and Anomaly Alerts
AIOps for NGFW Alert Reference
Security Posture
Monitor Feature Adoption
Monitor Feature Configuration
Configure Security Checks
Proactively Enforce Security Checks
Assess Vulnerabilities
Activity
Settings
Get Alert Notifications
Configure User Settings
Release Updates
What’s New in AIOps for NGFW
Previous
Next
Security Posture
In addition to helping you keep your firewalls functionally healthy,
AIOps for NGFW
aids in verifying that they are providing you with effective protection against security threats.
Monitor Feature Adoption
Monitor Feature Configuration
Configure Security Checks
Assess Vulnerabilities
Previous
Next
Recommended For You
Recommended Videos
Recommended videos not found.