ACC
Tabs
The ACC includes the following predefined tabs for viewing
network activity, threat activity, and blocked activity.
Tab | Description |
---|---|
Network Activity | Displays an overview of traffic and user
activity on your network including:
In
addition, you can also view network activity by source or destination
zone, region, or IP address, ingress or egress interfaces, and GlobalProtect
host information such as the operating systems of the devices most
commonly used on the network. |
Threat Activity | Displays an overview of the threats on the
network, focusing on the top threats: vulnerabilities, spyware,
viruses, hosts visiting malicious domains or URLs, top WildFire
submissions by file type and application, and applications that
use non-standard ports. The Compromised Hosts widget in this tab
(the widget is supported on some platforms only), supplements detection
with better visualization techniques; it uses the information from
the correlated events tab ( Automated Correlation
Engine Correlated Events |
Blocked Activity | Focuses on traffic that was prevented from
coming into the network. The widgets in this tab allow you to view
activity denied by application name, username, threat name, blocked content—files
and data that were blocked by a file blocking profile. It also lists
the top security rules that were matched on to block threats, content,
and URLs. |
Tunnel Activity | Displays the activity of tunnel traffic
that the firewall inspected based on your tunnel inspection policies.
Information includes tunnel usage based on tunnel ID, monitor tag,
user, and tunnel protocols such as Generic Routing Encapsulation
(GRE), General Packet Radio Service (GPRS) Tunneling Protocol for
User Data (GTP-U), and non-encrypted IPSec. |
You can also Interact with the ACC to
create customized tabs with custom layout and widgets that meet
your network monitoring needs, export the tab and share with another
administrator.
Recommended For You
Recommended Videos
Recommended videos not found.