The Application Usage report gives you visibility into the applications in use in your
network, and helps you to focus in on controlling unsanctioned and risky
applications.
Where Can I Use
This? | What Do I Need? |
- Prisma Access (Managed by Strata Cloud Manager)
- Prisma Access (Managed by Panorama)
- NGFW (Managed by PAN-OS or Panorama)
- NGFW (Managed by Strata Cloud Manager)
- VM-Series, funded with Software NGFW Credits
|
|
Know the security challenges associated with the applications traversing your
network. Application Usage findings can help you to refine your security policy to
control unsanctioned and risky applications.
Application Usage report includes:
An overview of the applications on your network, including risk, sanction
status, bandwidth consumed, and the top users of these applications.
- Applications and users with the most data transfer - Examine the activity of
users who share the most data viewed by amount of data transferred or number of
applications used
- Applications blocked by your security policy rules. Review to see if all the
high risk applications are enforced appropriately in your network.
- Top application types and subcategories on your network. Application
subcategories classify applications into groups based on function; you can
filter your logs based on application subcategory to dive more deeply into the
date you see here.
- Most heavily used applications by users on your network - Review the high risk
applications in detail under each subcategory. Users most contributing to the
traffic, threats the applications are exposed to, and statistics of WildFire
submissions.
- Applications that use non-standard ports - Monitor the traffic from these
applications that are transferring data through non-standard ports. Refine the
security policy rules for these applications to prevent threats from entering
your network. You have the search option to filter users who are using the
application and click View Logs to view traffic
sessions related to the application.
- Unsanctioned applications that are transferring the most amount of data and the
users using those unsanctioned applications. Review the traffic log and see if
you need to modify the enforcement by security policy rule to reduce the risk.