Activity Insights: View Mobile Users
Focus
Focus
Strata Cloud Manager

Activity Insights: View Mobile Users

Table of Contents

Activity Insights: View Mobile Users

View Mobile Users provides an overview of all users and hosts connected to Palo Alto Networks' security solutions, which include Next-Generation Firewall (NGFW) and Prisma Access.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by PAN-OS or Panorama)
  • NGFW (Managed by Strata Cloud Manager)
You must have at least one of these licenses to use the Activity Insights:
  • Prisma Access
  • AIOps for NGFW Free (use the AIOps for NGFW Free app) or AIOps for NGFW Premium license (use the Strata Cloud Manager app)
View Mobile Users provides an overview of all users and hosts connected to Palo Alto Networks' security solutions, which include Next-Generation Firewall (NGFW) and Prisma® Access. You can easily determine a user's or host's connection status to NGFW or Prisma Access, whether at a branch site, service connection, or remote location. You can view information about:
  • The total number of unique users currently connected to Palo Alto Networks security solutions and users connected to NGFW and Prisma Access.
  • The number of users who are connected during a certain time range, broken down by users connected through NGFW and Prisma Access.
  • Agent-based users connected through NGFW and Prisma Access.
  • Agent-based or browser-based Explicit Proxy users connected to NGFW and Prisma Access.
  • Users connected through Prisma Access Browsers.
  • A list of unmanaged device users accessing Prisma Access.
  • A list of users connecting from branch locations to Prisma Access.
  • A list of users connecting their data centers using specific service connections.

Users

In Strata Cloud Manager, go to Activity InsightsInsightsUsers to view information about your Prisma Access Agent Users, Agentless Proxy Users, Prisma Access Browsers, Office Users, and Other Hosts.
You can filter the information shown on the Users default page by:
  • Enter a username in the Search field to find the user you want.
  • Time Range—Filter information by time range.
  • Scope Selection—Select NGFW, Prisma Access, or All.
  • Connection Method—Select any of the following connection methods:
    • All—All connection methods.
    • Access Agent—GlobalProtect™ or Prisma Access Agent.
    • Agentless Proxy—Agentless proxy users connect using Explicit Proxy.
    • PA Browser—Prisma Access Browser secures both managed and unmanaged devices.
    • Office—Office users are remote or branch users.
    • Other—Other hosts, listed by IP address.
  • Subtenant—Subtenants listed by name.
  • Use check boxes in the Add Filter drop-down to filter by:
    • User Name—Unique username.
    • Device Name—Unique device name.
    • Agent Version—GlobalProtect or Prisma Access Agent.
    • OS Family/Version—OS family and version.
    • Source Location—Source city and country.
    • Source IP Address—Source IP address.
    • Application—Application name.
    • Remote Browser Isolation—When set to Enabled, view users connected through Remote Browser Isolation, or RBI, only.
    • User Groups—Specific user groups.
    • Experience Score—ADEM experience score.
    • Endpoint Experience Score—ADEM endpoint experience score.
    • Wi-Fi Experience Score—ADEM Wi-Fi experience score.
    • Local Network Experience—ADEM local network experience.
    • PA Experience Score—ADEM Prisma Access experience score.
    • Internet Experience Score—ADEM internet experience score.
    • Self Serve—ADEM Self-Serve information.
    • Internet Service Provider—ISP used.
    • Application Domain—Application domain.
    • Prisma Access Location—GlobalProtect and ADEM users.

All Users/Hosts Table

The All Users/Hosts table shows all the mobile users in your environment. In the Scope Selection drop-down, remove NGFW to view ADEM-related data. Select a User Name to go to the user's details page, and click on the number of Threats to see threat details.
  • User Name—Unique username or IP address.
  • Connection Method—Access Agent, Agentless Proxy, Prisma Access Browser, Office, or Other Hosts.
  • Last Device Location—Device's location by city, country.
  • Threats—Number of threats the user faces. Click on the number to see threat details.
  • Applications—Number of applications connected to the user.
  • Data Usage—Total data usage in bytes.
  • User Experience Score—ADEM user experience score.
  • Endpoint Experience Score—ADEM endpoint experience score.
  • Wi-Fi Experience Score—ADEM Wi-Fi experience score.
  • Local Network Experience—ADEM local network experience.
  • PA Experience Score—ADEM Prisma Access experience score.
  • Internet Experience Score—ADEM internet experience score.
  • Self Serve—ADEM Self-Serve information.
  • Last Firewall/PA Location—Last connected NGFW name or Prisma Access location.
  • Last Activity Time—Most recent date and time the user was active.

Agent Users

Agent users connect through GlobalProtect or Prisma Access Agent. Select the number under Agent Users to view details about your agent users.
View details about your Users, User Devices, and the number of currently connected users. You can View Trend by Users or User Devices connected to Prisma Access at the time indicated in the timestamp. From the Scope Selection drop-down, select All, Prisma Access, or NGFW users to refine the data that appears. If you have an Autonomous DEM (ADEM) license, you can remove NGFW from the drop-down to view ADEM-related data.

Access Agent Users Graph

Hover over the trend line in the Access Agent Users chart to observe the number of Connected Users or Connected User Devices and the corresponding connection time.

Monitored Users

If you have an AI-Powered ADEM license, you can view the number of users monitored by Autonomous DEM (ADEM) and the number of monitored user devices. This widget appears only when you have disabled NGFW from the Scope Selection drop-down.
  • Monitored Users—Total number of users monitored by ADEM.
  • Average User Experience Score—Experience score aggregated across all users monitored on ADEM. See how many users have a Good (green), Fair (orange), or Poor (red) experience score.
  • Monitored User Devices—Total number of user devices monitored by ADEM.

Agent Risky Users

View the number of agent users affected by threats. The Up or Down arrow compares this time range with a previous time range to determine the difference, in percentage, of the number of connected devices.
View More Details for Access Agent Versions
Select View More Details for: Access Agent Versions shows the access agent versions that your users’ devices are using to connect to Prisma Access. Select GlobalProtect or Prisma Access Agent to see the total Number of Connected Devices as well as the Version and Number of Connected Devices during the last 30 days. Use the data displayed to enforce compliance with the latest GlobalProtect or Prisma Access Agent versions.
View More Details for IP Pool Utilization
Static IP pools provide an alternate means of allocating IP addresses to the agent users. To view IP pool utilization by different IP pool allocation theaters based on the number of connected users at that time, select View More Details for: IP Pool Utilization. The IP pool utilization percentage on the graph is the number of IP pool blocks used out of all the IP pool blocks that are available across all the subnets. You can proactively add subnets when you see an IP pool bar approaching the maximum capacity for any region.
IP Pool Utilization Details
Current IP Pool Utilization—One IP pool address block is a /24 subnet and has 254 IP addresses. Allocation of a pool block counts toward utilization; however, allocating a pool block does not mean that all IP addresses are in use. There are still available pool blocks that can be allocated to new or existing mobile user gateways as needed. See IP pool utilization by different IP pool allocation theaters based on the number of connected users at that time.
  • IP Pool Allocation—The IP pool utilization percentage on the graph is the number of IP pool blocks used out of all the IP pool blocks that are available across all subnets. You can add subnets when you see an IP pool bar approaching the maximum capacity for any region.
  • Static IP Address Allocation provides an alternate means of allocating IPs to the agent users. IP Pool Detailsshows IP pool utilization displayed under the IP Pool Name that comes from the static IP pool configuration. Total IP Pool Profiles shows the number of utilized profiles in the IP pool, and Total Unused IP Addresses shows the number of unused IP addresses in the IP pool.
    The IP Pool Details table shows:
    • IP Pool Name—Unique IP pool name.
    • Total IP Addresses—Total number of users in the IP pool.
    • Active IP Addresses—Total number of active users in the IP pool.
    • Peak Utilization Status—Highest percentage of use for the IP pool during the selected Time Range.
    • Last IP Assignment Timestamp—Most recent time the IP pool was active.
Access Agent Users Table
The Access Agent Users table shows Users or User Devices.
Users
  • Current Connected—Turn Current Connected ON to view connected users only. Turn it OFF to see all of your users.
  • User Name—Unique username.
  • User Devices—Number of devices associated with the user.
  • Applications—Number of applications connected to the user.
  • Threats—Threats information for the user.
  • Data Usage—User's data usage.
  • Last Login Time—Last date and time the user logged in.
User Devices
  • Current Connected—Turn Current Connected ON to view connected users only. Turn it OFF to see all of your users.
  • Agent Type—Filter information by GlobalProtect or Prisma Access Agent.
  • Source IP Address—Unique IP address.
  • OS Family/Version—OS family and version to which the device belongs.
  • User Experience Score—Overall application experience score of your users.
  • Last Device Location—Device's location by city, country.
  • Last Firewall/PA Location—Last connected NGFW name or Prisma Access location.
  • ISP Name—Unique ISP name.
  • Last Activity Time—Most recent date and time the user was active.
  • Connectivity ModeTunnel, Proxy, or Tunnel and Proxy.
  • Self Serve Notifications—(ADEM only) Number of Self-Serve notifications sent to the user's device.
  • Self Serve Status—(ADEM only) Enabled or disabled on the device.
Click on any username to view information about the user's Activity, Connectivity, and Experience.
Agent User Activity
See the user's Total Threats, Threats by Risk Level, web browsing summary, and application summary during the selected time range.
The Web Browsing Summary shows details about the URLs the user has visited.
  • Overview shows the number of unique URLs that the user has visited, Severity of URLs (High, Medium, or Low), and the number of Malicious URLs the user has visited.
    Most Visited Sites shows the most visited sites in order of number of times visited, Site Category, Risk Level, and number of Sessions, or visits the user made to this site.
  • Blocked shows the number of Blocked URLs the user tried to access, the Severity of Blocked URLs (High, Medium, or Low), Malicious Blocked URLs, and Blocked URLS with Most Visited Sites.
  • Sessions shows:
    • Total Hits—The number of times the user has accessed websites.
    • Category Session Breakdown—Breaks down the types of sites the user visited.
    • Top URL Categories for Sessions—The top categories, in order, that the user visited.
  • Data Transfer shows the Total Data Transferred, Category Data Transfer Breakdown, and Top URL Categories for Data Transfer table that shows Category, Unique URLs for each category, and Data Transferred, in MB, for each category.
The Application Summary shows information about the user's applications during the selected time range.
  • Activity—The user's number of Total Apps, Applications by Risk Score, Top App Categories, and a list of All Applications that shows each one's App Risk score. App risk scores are ranked in numerical order from high (5) to low (0).
  • Blocked—The user's Total Blocked Applications, Total Allowed Applications, and the Total Blocked Applications table that shows a list of blocked applications by Application Name and Rule.
  • Sessions—Details about each time the user accessed each application. You can view the user's number of Total Sessions, Category Sessions Breakdown, and the Top Used Applications, which shows the number of user sessions for each application during the selected time range.
  • Data Transfer—The Total Data Transferred, Category Data Transfer Breakdown, and Top Applications with Data Transferred by Application Name and Data Transferred in MB.
Agent User Connectivity
Understand your user's device connectivity by reviewing the Connected User's Device Trend chart, Connected User's Devices, and User Login & Logout Events on all devices.
  • The Connected Devices User Trend chart illustrates the number of devices that connect at specific times during the selected time range. Hover over a point in the chart to view the number of devices connected at that date and time.
  • The Connected User's Devices table shows details about each of the user's connected devices, by device name:
    • Last User Source IP Address—Most recent user source IP address.
    • Last Private IP—Most recent private IP address.
    • Last User Location—User's most recent location.
    • Last Login Time—Date and time the device last logged in.
    • Last Logout Time—Date and time the device last logged out.
    • Last Session Duration—How long the most recent session lasted.
    • Auth Type—Auth type used.
    • OS Family/Version—OS family and version used by the device.
    • Agent Version—Agent version used by the device.
    • Firewall/Location—Firewall or location used by the device.
  • The User Login & Logout Events table gives details about the device's login and logout events:
    • User Source IP Address—Device's user source IP address.
    • Private IP—Device's private IP address.
    • User Location—Device user's location.
    • Login Time—Date and time the device is logged in.
    • Logout Time—Date and time the device is logged out.
    • Session Duration—How long the session lasted.
    • Auth Type—Auth type used.
    • OS Family/Version—OS family and version used by the device.
    • Agent Version—Agent version used by the device.
    • Firewall/Location—Firewall or location used by the device.
    • Agent Type—Agent type used.

Agentless Proxy Users

Select the number under Agentless Proxy Users to view details about your agentless proxy (formerly Explicit Proxy) users.

Active Agentless Proxy Users Graph

Hover over the trend line in the Active Agentless Proxy Users chart to observe the number of Active Users and the corresponding connection time. View the total number of Active Users connected through agentless proxy.

Agentless Proxy Risky Users

View the number of users affected by threats. The Up or Down arrow compares this time range with a previous time range to determine the difference, in percentage, of the number of connected devices.

Agentless Proxy Users Table

The Agentless Proxy Users table lists your agentless proxy users by User Name.
  • Last Source Location—The source's last city and country.
  • Last Used PA Location—The last used Prisma Access location.
  • Source IP—The source IP address.
  • Last Login Time—The most recent time the agentless proxy user logged in.
  • OS Family/Version—OS family and version.
  • Browser Name—Name of the browser used.
Click on any username to view information about the agentless proxy user's Activity and Connectivity.

Agentless Proxy User Activity

Hover over the trend line in the Active User Session Trend chart to observe the number of connected users and the corresponding connection time.
View all User Login & Logout Events details:
  • User Source IP Address—Device's user source IP address.
  • User Location—Device user's city and country.
  • Login Time—Date and time the device last logged in.
  • PA Location Used—Prisma Access location.
  • Bytes Sent—Number of bytes sent.
  • Bytes Received—Number of bytes received.

Prisma Access Browser Users

Prisma Access Secure Enterprise Browser (Prisma Access Browser) is the only solution that secures both managed and unmanaged devices, through a natively integrated enterprise browser that extends protection to unmanaged devices. Select the number under Prisma Access Browser Users to view details about your users connected through Prisma Access Browser.

Prisma Access Browser Users Details

View the number of Prisma Access Browser Active Users, Managed User Devices, and Unmanaged User Devices.
Hover over the trend line in the Prisma Access Browser Users chart to observe the number of Connected Users or Connected User Devices and the corresponding connection time.

Blocked DLP Prisma Access Browser Events

View information from data loss prevention (DLP) about Prisma Access Browser events. These are activities by all the users on Prisma Access Browser. Because Prisma Access Browser is a Palo Alto Networks browser, we have full control over the events that appear in the widget, and we can block or disable any of these events for all Prisma Access Browser users or specific users or groups. For example, you might see a large spike in FileDownloads and decide to disable specific users or user groups causing that spike.

Prisma Access Browser Users Table

The Prisma Access Browser Users table shows Users or Devices.
Users by unique username:
  • User Devices—Number of devices associated with the user.
  • Applications—Number of applications connected to the user.
  • PA Browser Events—Number of times the user connected with Prisma Access Browser.
  • Last Activity Time—Most recent date and time the user was active.
Click on any username to view information about the user's Activity and Experience.

Office Users

Office users physically occupy the office and connect internally. Even if they are not using GlobalProtect or Prisma Access Browser, they can still connect to internal applications such as Confluence or Jira. Branch users are included in the Office Users category. Select the number under Office Users to view details about your users connected through Prisma Access Browser.

Office Users Graph

Hover over the trend line in the Office Users chart to see connected Office Users and when they were connected. View the total number of active office users.

Office Users Risky Users

View the number of office users affected by threats. The Up or Down arrow compares this time range with a previous time range to determine the difference, in percentage, of the number of connected devices.

Office Users Table

The Office Users table shows office users by User Name.
  • Connection Method—Method through which the user connects.
  • Last Device Location—Device's location by city, country.
  • Threats—Number of threats the user faces.
  • Applications—Number of applications connected to the user.
  • Data Usage—Total data usage in bytes.
  • Last Firewall/PA Location—Last connected NGFW name or Prisma Access location.
  • Last Activity Time—Most recent date and time the user was active.

Other Hosts

The Other Hosts category shows IP addresses with traffic on the network, such as users' private mobile phones that are not connected through GlobalProtect or internally as an office user. Information for other hosts falls into two categories: internal and external hosts accessing resources on the internet. Internal hosts serve on-site users, such as guests or employees using their mobile phones in the office, and external hosts serve users, such as people visiting your enterprise website.
Select the number under Other Hosts to view details about your other hosts.

Other Hosts Graph

Hover over the trend line in the Other Hosts chart to see the number of connected IP addresses, or other hosts and the date and time they were connected. View the total number of active other hosts.

Other Hosts Risky Users

View how many other hosts are affected by threats. The Up or Down arrow compares this time range with a previous time range to determine the difference, in percentage, of the number of connected devices.

Other Hosts Table

The Other Hosts table shows other hosts by IP address.
  • User Devices—Number of devices associated with the user.
  • Applications—Number of applications connected to the user.
  • Threats—Threats information for the user.
  • Data Usage—User's data usage.
  • Last Activity Time—Date and time of the user's most recent activity.