Assess Network Traffic (SCM)
Focus
Focus
Next-Generation Firewall

Assess Network Traffic (SCM)

Table of Contents


Assess Network Traffic (SCM)

Learn about how to assess network traffic in your Strata Cloud Manager managed NGFWs.
Now that you have a basic security policy, you can review the statistics and data in the Strata Cloud Manager Command Center, Activity Insights, and its various dashboards.
Use this information to identify where you need to create more granular security policy rules:
  • Use the Command Center
    In the Command Center, review the most used applications and the high-risk applications on your network. The Command Center is a visualized overview of your network and security infrastructure. It provides you with four different views, each with its own tracked data, metrics, and actionable insights to examine and interact with.
  • Use Activity Insights
    Activity Insights gives you an in-depth view of your network activities across Prisma Access and NGFW deployments. Activity Insights unifies your network data such as network traffic, application usage, threats, and user activities in one place.
  • Evaluate Your Security Policy
    You can use built-in security checks to evaluate the strength of your security rules and policy and determine if any of the following is needed:
    • Whether to allow web content based on schedule, users, or groups.
    • Allow or control certain applications or functions within an application.
    • Decrypt and inspect content.
    • Allow but scan for threats and exploits.
    • For information on refining your security policies and for attaching custom security profiles, see how to create a security policy rule and security profiles.
    For information on refining your security policies and for attaching custom security profiles, see how to create a security policy rule and security profiles.
  • View Incidents
    Strata Cloud Manager provides a unified incidents and alerts framework. In one place, view, investigate, and address the alerts and incidents on your network, and jump to your logs to examine the associated activity.
  • Monitor Your Network
    Monitor the health and security of everything on your network, and use the IoC Search to investigate the history of an artifact on your network and review global analysis findings. What you can monitor depends on your active security subscriptions.