Learn about how you can manage all aspects of your Palo Alto Networks cybersecurity
infrastructure with the new Strata Command Center
The Strata Cloud Manager Command
Center is your new NetSec homepage; it is your first stop to assess
the health, security, and efficiency of your network. In a single view, the command
center shows you all users and IoT devices accessing the internet, SaaS
applications, and private apps, and how Prisma Access, your NGFWs, and your security
services are protecting them.
The command center provides you with four different views, each with its
own tracked data, metrics, and actionable insights to examine and interact with:
- Summary: A high-level look at all your network and security
infrastructure. Monitor the traffic between your sources (users, IoT) and
applications (private, SaaS), and see metrics onboarded security
subscriptions.
- Threats: Dig deeper into anomalies on your network and block threats
that are impacting your users. Review the traffic inspected on your network
and see how threats are being detected and blocked around the clock by your
Cloud-Delivered Security subscriptions.
- Operational Health: Review incidents of degraded user experience on
your network and see root-cause analysis of the issues and remediation
recommendations.
- Data Security: Find high-risk sensitive data and update data profiles
to further secure your network. Review the sensitive data flow across your
network and SaaS applications.
When the command center surfaces an issue through one of these views that
you should address or investigate (an anomaly, a security gap, a degraded user
experience, something that impacts the security and health of your network), it
provides a path to where you can take actions to further secure your network.
For example, if you are looking at the Threats view and would like more information
about Command and Control threats on your network, you can click C2 in the Blocked
and Alerted Threats table and jump to
Activity Insights, where you can drill
down and investigate details about all the Command and Control threats, such as the
threat name, severity, and change the action from Alert to Drop.