Monitoring
    
    Monitor network traffic, threats, and performance. Use Dashboards, ACC, and reports
        for insights, ACE for correlations, and packet captures for detailed analysis.
    
  
    
  
| Where Can I Use This? | What Do I Need? | 
    
                            - NGFW (Managed by PAN-OS or Panorama)
 - NGFW (Managed by Strata Cloud Manager)
  
                         | 
                            - Support license
 - (Panorama) Device management license
 - AIOps for NGFW Premium license (use the Strata Cloud Manager app)
  
                         | 
 
  
 
  
Monitoring capabilities in Palo Alto Networks firewalls provide you with comprehensive
            visibility into network traffic, threats, and system performance. When you use these
            monitoring features, you gain critical insights that accelerate incident response and
            enable proactive network management.
The Dashboard serves as your quick reference for firewall status, displaying key metrics
            like software version, interface status, and resource utilization. You can customize
            widgets to show the information most relevant to your security operations and adjust
            refresh intervals to maintain current data. This immediate visibility helps you quickly
            identify potential issues before they impact your network.
For deeper analysis, the Application Command Center (ACC) offers interactive, graphical
            summaries of network activity derived from firewall logs. You can apply filters to
            examine specific traffic segments, customize tab layouts to match your monitoring
            priorities, and export views as PDFs for reporting. The "Compromised Hosts" widget is
            particularly valuable, aggregating correlated events to help you identify potentially
            infected systems that require immediate attention.
Reports provide detailed insights into long-term network behavior. You can generate App
            Scope reports to track application usage changes, bandwidth consumption, and emerging
            threats. Custom reports allow you to tailor analysis to your organization's specific
            security requirements, while specialized Botnet, SaaS Application Usage, and User
            Activity reports help identify security gaps. You can schedule reports for automatic
            email delivery, ensuring stakeholders receive regular security updates.
The Automated Correlation Engine (ACE) enhances your threat detection capabilities by
            analyzing logs for suspicious patterns. When investigating specific incidents, Packet
            Captures (Pcaps) provide detailed traffic data for troubleshooting. For comprehensive
            audit trails, the various log types (Traffic, Threat, URL Filtering, etc.) can be
            filtered, exported, and forwarded to external monitoring systems.
To implement effective monitoring, you must configure appropriate log storage settings,
            establish external log forwarding if needed, and customize dashboards and reports to
            align with your security objectives. These monitoring capabilities enable you to
            identify security incidents, track compliance, optimize network performance, and
            demonstrate security effectiveness to management.
    
    To use the monitoring functionality with the PA-410 you must manage PA-410 firewalls through a
                Panorama management server.