Prisma Access Visibility and Monitoring with Strata Cloud Manager
Table of Contents
Expand all | Collapse all
-
- Remote Networks: IPSec Termination Nodes and Service IP Addresses
- Remote Networks: IP Address Changes Related To Bandwidth Allocation
- Remote Networks: Service IP Address and Egress IP Address Allocation
- API Examples for Retrieving Prisma Access IP Addresses
- Get Notifications When Prisma Access IP Addresses Change
- Prisma Access Zones
- High Availability for Prisma Access
-
- Enable Dynamic Privilege Access for Prisma Access Through Common Services
- Authorize User Group Mapping in Cloud Identity Engine for Dynamic Privilege Access
- Enable the Access Agent
- Set Up the Agent Infrastructure for Dynamic Privilege Access
- Create a Snippet
- Create a Project
- Traffic Steering for Dynamic Privilege Access
- Push the Prisma Access Agent Configuration
- Download the Dynamic Privilege Access Enabled Prisma Access Agent Package
-
- Log in to the Dynamic Privilege Access Enabled Prisma Access Agent
- Change Preferences for the Dynamic Privilege Access Enabled Prisma Access Agent
- Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Location
- Switch to a Different Project
- Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Server
- Disable the Dynamic Privilege Access Enabled Prisma Access Agent
- View and Monitor Dynamic Privilege Access Users
- View and Monitor Dynamic Privilege Access Projects
- Automatic Tunnel Restoration in Dynamic Privilege Access Prisma Access Agents
- Manage Prisma SASE 5G
-
-
- Explicit Proxy Configuration Guidelines
- How Explicit Proxy Identifies Users
- Explicit Proxy Forwarding Profiles
- Explicit Proxy Best Practices
- Block Settings for Explicit Proxy
- Use Special Objects to Restrict Explicit Proxy Internet Traffic to Specific IP Addresses
- Configure Proxy Chaining with Blue Coat Proxy
- IP Address Optimization for Explicit Proxy Users- Proxy Deployments
- View User to IP Address or User Groups Mappings
- Report Mobile User Site Access Issues
- Enable Mobile Users to Access Corporate Resources
-
- Planning Checklist for Remote Networks
- Connect a Remote Network Site to Prisma Access
- Enable Routing for Your Remote Network
- Onboard Multiple Remote Networks
- Configure Remote Network and Service Connection Connected with a WAN Link
- Integrate a Shared Desktop VDI with Prisma Access Using Terminal Server
-
- Multitenancy Configuration Overview
- Plan Your Multitenant Deployment
- Create an All-New Multitenant Deployment
- Enable Multitenancy and Migrate the First Tenant
- Add Tenants to Prisma Access
- Delete a Tenant
- Create a Tenant-Level Administrative User
- Sort Logs by Device Group ID in a Multitenant Deployment
-
- Add a New Compute Location for a Deployed Prisma Access Location
- How BGP Advertises Mobile User IP Address Pools for Service Connections and Remote Network Connections
- Proxy Support for Prisma Access and Strata Logging Service
- Block Incoming Connections from Specific Countries
- Prisma Access for No Default Route Networks
-
-
- Default Routes With Prisma Access Traffic Steering
- Traffic Steering in Prisma Access
- Traffic Steering Requirements
- Default Routes with Traffic Steering Example
- Default Routes with Traffic Steering Direct to Internet Example
- Default Routes with Traffic Steering and Dedicated Service Connection Example
- Prisma Access Traffic Steering Rule Guidelines
- Configure Zone Mapping and Security Policies for Traffic Steering Dedicated Connections
- BGP Filtering and Route Metric Support on Service Connections in Prisma Access
-
- Configure Privileged Remote Access Settings
- Set Up the Privileged Remote Access Portal
- Configure Applications for Privileged Remote Access
- Set Up Privileged Remote Access Profiles
- Define Permissions for Accessing Privileged Remote Access Apps
- Manage Privileged Remote Access Connections
- Use Privileged Remote Access
Prisma Access Visibility and Monitoring with Strata Cloud Manager
Learn about visibility and monitoring features in Strata Cloud Manager.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
- For Prisma Access (Managed by Strata Cloud Manager), you can use Strata Cloud Manager
- or you can use Panorama to manage Prisma Access
These two management interfaces are how you handle onboarding, configuration,
and security policy enforcement for your Prisma Access environment. However,
Prisma Access also includes robust visibility and monitoring for your Prisma Access environment, and these features are provided on Strata Cloud
Manager.
Importantly:Regardless of the management interface
you're using for Prisma Access (Strata Cloud Manager or Panorama), you can use
Strata Cloud Manager for many of your Prisma Access visibility features, and to
interact with add-on subscriptions like AI-Powered Autonomous DEM.
Prisma Access Visibility and Monitoring Features on Strata Cloud Manager | |
---|---|
Autonomous DEM |
Provides native, end-to-end visibility and insights for all user
traffic in your Secure Access Service Edge (SASE) environment.
ADEM functionality is natively integrated into the GlobalProtect
app and Prisma Access and therefore does not require you to
deploy any additional appliances or agents. You can quickly
isolate the source of digital experience problems, and simplify
remediation.
This feature requires the Autonomous DEM
add-on license to use with Prisma Access (Managed by Panorama) Access. |
Dashboards and Reports in Strata Cloud Manager |
Visibility features in Strata Cloud Manager identify key findings
that you can use to inform your policy updates and close
enterprise security and user productivity gaps.
|
Strata Cloud Manager Command Center |
The Command Center is an interactive, visual summary of the IoT
devices, users, hosts, and traffic on your network. Utilizing
the data from your cloud-delivered security and ADEM
subscriptions, the Command center surfaces important information
on the threats, user experience, and security of data on your
network.
The Command Center allows you to interact with the data and
visualize the relationships between events on the network, so
that you can uncover anomalies or find ways to enhance your
network security.
|