To forestall potential issues and to accelerate incidence response when needed, the firewall provides intelligence about traffic and user patterns using customizable and informative reports. The dashboard, Application Command Center (ACC), reports, and logs on the firewall allow you to monitor activity on your network. You can monitor the logs and filter the information to generate reports with predefined or customized views. For example, you can use the predefined templates to generate reports on user activities or analyze the reports and logs to interpret unusual behavior on your network and generate a custom report on the traffic pattern. For a visually engaging presentation of network activity, the dashboard and the ACC include widgets, charts, and tables with which you can interact to find the information you care about. In addition, you can configure the firewall to forward monitored information as email notifications, syslog messages, SNMP traps, and NetFlow records to external services.
- Use the Dashboard
- Use the Application Command Center
- Use the App Scope Reports
- Use the Automated Correlation Engine
- Take Packet Captures
- Monitor Applications and Threats
- View and Manage Logs
- Monitor Block List
- View and Manage Reports
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
- Use Syslog for Monitoring
- SNMP Monitoring and Traps
- Forward Logs to an HTTP(S) Destination
- NetFlow Monitoring
Centralized Logging and Reporting
Centralized Logging and Reporting Panorama aggregates logs from all managed firewalls and provides visibility across all the traffic on the network. It also provides an ...
What Data Center Traffic to Log and Monitor
The types of data center traffic you should log and monitor, the tools you can use to analyze the traffic, and how to best utilize ...
View and Manage Reports
View and Manage Reports The reporting capabilities on the firewall allow you to keep a pulse on your network, validate your policies, and focus your ...
Log and Monitor Data Center Traffic
Use logging and monitoring tools to find out which applications are in use, how they behave, and who is really on your data center network ...
Monitor > PDF Reports > SaaS Application Usage
Monitor > PDF Reports > SaaS Application Usage Use this page to generate a SaaS application usage report that summarizes the security risks associated with ...
Device > Setup > Telemetry
Device > Setup > Telemetry Telemetry is the process of collecting and transmitting data for analysis. When you enable telemetry on the firewall, the firewall ...
Monitor > PDF Reports > Email Scheduler
Monitor > PDF Reports > Email Scheduler Use the Email scheduler to schedule reports for delivery by email. Before adding a schedule, you must define ...
What Telemetry Data Does the Firewall Collect?
What Telemetry Data Does the Firewall Collect? The firewall collects and forwards different sets of telemetry data to Palo Alto Networks based on the Telemetry ...
Use External Services for Monitoring
Use External Services for Monitoring Using an external service to monitor the firewall enables you to receive alerts for important events, archive monitored information on ...