The ACC includes the following predefined tabs for viewing network activity, threat activity, and blocked activity.
Displays an overview of traffic and user activity on your network including:
In addition, you can also view network activity by source or destination zone, region, or IP address, ingress or egress interfaces, and GlobalProtect host information such as the operating systems of the devices most commonly used on the network.
Displays an overview of the threats on the network, focusing on the top threats: vulnerabilities, spyware, viruses, hosts visiting malicious domains or URLs, top WildFire submissions by file type and application, and applications that use non-standard ports. The Compromised Hosts widget in this tab (the widget is supported on some platforms only), supplements detection with better visualization techniques; it uses the information from the correlated events tab (Automated Correlation EngineCorrelated Events) to present an aggregated view of compromised hosts on your network by source users/IP addresses and sorted by severity.
Focuses on traffic that was prevented from coming into the network. The widgets in this tab allow you to view activity denied by application name, username, threat name, blocked content—files and data that were blocked by a file blocking profile. It also lists the top security rules that were matched on to block threats, content, and URLs.
Displays the activity of tunnel traffic that the firewall inspected based on your tunnel inspection policies. Information includes tunnel usage based on tunnel ID, monitor tag, user, and tunnel protocols such as Generic Routing Encapsulation (GRE), General Packet Radio Service (GPRS) Tunneling Protocol for User Data (GTP-U), and non-encrypted IPSec.
You can also Interact with the ACC to create customized tabs with custom layout and widgets that meet your network monitoring needs, export the tab and share with another administrator.
ACC Tabs Network Activity —Displays an overview of traffic and user activity on your network. This view focuses on the top most-used applications, the top ...
A First Glance at the ACC
A First Glance at the ACC The following table shows the ACC tab and describes each component. A First Glance at the ACC 1 Tabs ...
Widget Descriptions Each tab on the ACC includes a different set of widgets. Widget Description Network Activity —Displays an overview of traffic and user activity ...
Use the Application Command Center
Use the Application Command Center The Application Command Center (ACC) is an interactive, graphical summary of the applications, users, URLs, threats, and content traversing your ...
Use Case: ACC—Path of Information Discovery
Use Case: ACC—Path of Information Discovery The ACC has a wealth of information that you can use as a starting point for analyzing network traffic. ...
ACC—First Look Take a quick tour of the ACC. ACC—First Look Tabs The ACC includes three predefined tabs that provide visibility into network traffic, threat ...
Review the Widgets in the ACC
Review the Widgets in the ACC In the ACC Threat Activity tab, check the Compromised Hosts widget and Threat Activity widget for any critical or ...
Monitor the Network with the ACC and AppScope
Monitor the Network with the ACC and AppScope Both the ACC and the AppScope allow you to monitor and report on the data recorded from ...
Use the Compromised Hosts Widget in the ACC
Use the Compromised Hosts Widget in the ACC The compromised hosts widget on ACC Threat Activity , aggregates the Correlated Events and sorts them by ...