Report Templates: App Usage
Focus
Focus
Strata Cloud Manager

Report Templates: App Usage

Table of Contents

Report Templates: App Usage

The Application Usage report gives you visibility into the applications in use in your network, and helps you to focus in on controlling unsanctioned and risky applications.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by PAN-OS or Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • VM-Series, funded with Software NGFW Credits
  • AIOps for NGFW Free (use the AIOps for NGFW Free app) or AIOps for NGFW Premium license (use the Strata Cloud Manager app) license
  • Strata Logging Service license
  • A role that has permission to view the dashboard
  • Prisma Access license
Know the security challenges associated with the applications traversing your network. Application Usage findings can help you to refine your security policy to control unsanctioned and risky applications.
Application Usage report includes:
  • An overview of the applications on your network, including risk, sanction status, bandwidth consumed, and the top users of these applications.
  • Applications and users with the most data transfer - Examine the activity of users who share the most data viewed by amount of data transferred or number of applications used
  • Applications blocked by your security policy rules. Review to see if all the high risk applications are enforced appropriately in your network.
  • Top application types and subcategories on your network. Application subcategories classify applications into groups based on function; you can filter your logs based on application subcategory to dive more deeply into the date you see here.
  • Most heavily used applications by users on your network - Review the high risk applications in detail under each subcategory. Users most contributing to the traffic, threats the applications are exposed to, and statistics of WildFire submissions.
  • Applications that use non-standard ports - Monitor the traffic from these applications that are transferring data through non-standard ports. Refine the security policy rules for these applications to prevent threats from entering your network. You have the search option to filter users who are using the application and click View Logs to view traffic sessions related to the application.
  • Unsanctioned applications that are transferring the most amount of data and the users using those unsanctioned applications. Review the traffic log and see if you need to modify the enforcement by security policy rule to reduce the risk.
  1. To download, share, or schedule a report, select ReportsReport TemplatesApp Usage Report and select any of these icons
    .
  2. If you’re scheduling a report, you’ll need to continue to define the report parameters including:
    • the Time Interval for which to gather data
    • the Schedule Parameters, which is the frequency at which you’d like the report to be delivered (daily, weekly, or monthly).
  3. Select the Scheduled Reports tab to view, edit, or delete the reports that have been scheduled to generate.
    You can choose to delete a scheduled report or edit the schedule.
  4. Select the History tab to view the list of reports generated in the past 30 days.