Optimize Security Posture
Focus
Focus
Next-Generation Firewall

Optimize Security Posture

Table of Contents

Optimize Security Posture

Where Can I Use This?
What Do I Need?
  • NGFW (Cloud Managed)
  • NGFW (PAN-OS or Panorama Managed)
  • VM-Series, funded with Software NGFW Credits
  • AIOps for NGFW Free (use the AIOps for NGFW Free app)
    or
  • AIOps for NGFW Premium license (use the Strata Cloud Manager app)
In addition to helping you keep your firewalls functionally healthy,
AIOps for NGFW
aids in verifying that they are providing you with effective protection against security threats.
Security posture assessments currently don't support multiple virtual systems; only the default virtual system (vsys1) is considered during configuration processing.
  • Monitor Security Posture Insights: Get visibility into the security status and trend of your deployment based on the security postures of the onboarded NGFW devices.
  • Monitor Feature Adoption: View the security features that you're using in your deployment.
  • Monitor Feature Configuration: View whether your security features are configured according to Palo Alto Networks best practices.
  • Monitor Security Advisories: View the number of devices impacted by a specific vulnerability based on the features that have been enabled on the devices.
  • Monitor Security Subscriptions: View the recommended Cloud-Delivered Security Services (CDSS) subscriptions and their usage in your devices.
  • Assess Vulnerabilities: View the vulnerabilities impacting a specific firewall and PAN-OS version, aiding in your decision-making process regarding whether an upgrade is necessary.
  • Build a Custom Dashboard: Create custom dashboards to get visibility into areas of your interest in your network using widgets.
  • Monitor Compliance Summary: View a history of changes to the security checks made up to 12 months in the past, grouped together by the Center for Internet Security (CIS) and the National Institute of Standards and Technology (NIST) frameworks.
  • Configure Security Checks And Other Posture Settings: Customize security posture checks for your deployment to maximize relevant recommendations.
  • Proactively Enforce Security Checks: Take proactive measures against suboptimal configurations by blocking commits that don't pass particular best practice checks.
  • Policy Analyzer: Get analysis and suggestions for possible consolidation or removal of specific policy rules to meet your intended Security posture, as well as checks for anomalies, such as shadows, redundancies, generalizations, correlations, and consolidations in your rulebase.

Recommended For You