Strata Cloud Manager
Proactively Enforce Security Checks
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
-
- Strata Copilot
- Command Center: Strata Cloud Manager
-
- Dashboard: Build a Custom Dashboard
- Dashboard: Executive Summary
-
- WildFire Dashboard: Filters
- WildFire Dashboard: Total Samples Submitted
- WildFire Dashboard: Analysis Insights
- WildFire Dashboard: Session Trends For Samples Submitted
- WildFire Dashboard: Verdict Distribution
- WildFire Dashboard: Top Applications Delivering Malicious Samples
- WildFire Dashboard: Top Users Impacted By Malicious Samples
- WildFire Dashboard: Top Malware Regions
- WildFire Dashboard: Top Firewalls
- Dashboard: DNS Security
- Dashboard: AI Runtime Security
- Dashboard: IoT Security
- Dashboard: Prisma Access
-
- Application Experience Dashboard: Mobile User Experience Card
- Application Experience Dashboard: Remote Site Experience Card
- Application Experience Dashboard: Experience Score Trends
- Application Experience Dashboard: Experience Score Across the Network
- Application Experience Dashboard: Global Distribution of Application Experience Scores
- Application Experience Dashboard: Experience Score for Top Monitored Sites
- Application Experience Dashboard: Experience Score for Top Monitored Apps
- Application Experience Dashboard: Application Performance Metrics
- Application Experience Dashboard: Network Performance Metrics
- Dashboard: Best Practices
- Dashboard: Compliance Summary
-
- Prisma SD-WAN Dashboard: Device to Controller Connectivity
- Prisma SD-WAN Dashboard: Applications
- Prisma SD-WAN Dashboard: Top Alerts by Priority
- Prisma SD-WAN Dashboard: Overall Link Quality
- Prisma SD-WAN Dashboard: Bandwidth Utilization
- Prisma SD-WAN Dashboard: Transaction Stats
- Prisma SD-WAN Dashboard: Predictive Analytics
- Dashboard: PAN-OS CVEs
- Dashboard: CDSS Adoption
- Dashboard: Feature Adoption
- Dashboard: On Demand BPA
- Manage: IoT Policy Recommendation
- Manage: Enterprise DLP
- Manage: SaaS Security
- Manage: Prisma Access Browser
- Reports: Strata Cloud Manager
-
-
- Strata Cloud Manager Release Information
-
- New Features in February 2025
- New Features in January 2025
- New Features in December 2024
- New Features in November 2024
- New Features in October 2024
- New Features in September 2024
- New Features in August 2024
- New Features in July 2024
- New Features in June 2024
- New Features in May 2024
- New Features in April 2024
- New Features in March 2024
- New Features in February 2024
- New Features in January 2024
- New Features in November 2023
- New Features in October 2023
- New Features in September 2023
- Known Issues
- Addressed Issues
- Getting Help
Proactively Enforce Security Checks
Use the Panorama CloudConnector Plugin to block faulty configurations before
they’re committed.
Where Can I Use This? | What Do I Need? |
---|---|
|
You can customize security posture checks for your deployment to maximize relevant
recommendations using the features below.
- Security ChecksList of the best practice checks that AIOps for NGFW uses to evaluate your configuration. The configuration of firewalls and Panorama is compared to Palo Alto Networks best practice checks to assess the security posture of your devices and to generate security alerts. You can see a list of the best practice checks that are used to evaluate your configuration.Here, you can:
- Set the severity level for checks to identify the checks that are the most critical to your deployment.
- Temporarily disable checks.If you choose to disable a check, you can specify how long it will remain disabled and leave a comment explaining the reason for disabling it.
- Set the response when a check fails.
- Zone to Role MappingMap the zones in NGFWs to roles to get customized recommendations.
- Role to Security Service MappingManage the security services needed for traffic between zones and roles in all NGFWs.
The Panorama CloudConnector Plugin enables you to take proactive measures against
suboptimal configurations by blocking commits that do not pass particular best
practice checks. When you indicate in AIOps for NGFW that you want a
check to Fail Commit, Panorama automatically blocks commits
of any configuration that does not pass that check. Rather than wait to receive an
alert about a failed best practice check, use the plugin to keep configuration
issues out of your deployment in the first place.
- Ensure that you meet all prerequisites, and install the plugin.
- Specify the best practice checks that will block commits on failure.
- Select ManageSecurity PostureSettings.
- Find the check that you want to block commits.
- Set Action on Fail to Fail Commit
- Verify by attempting to commit a configuration that does not pass the check.
- Log in to Panorama.
- Violate the best practice check that you specified to Fail Commit.
- Select CommitCommit to PanoramaValidate Configuration.
You should see a dialog stating that the validation failed because the configuration did not pass the best practice check.Setting a check to Fail Commit causes the check to fail both validation and the actual commit operation.See Manage: Security Posture Settings for more information.