Monitor Advanced Threat Prevention
Focus
Focus
Advanced Threat Prevention Powered by Precision AI™

Monitor Advanced Threat Prevention

Table of Contents

Monitor Advanced Threat Prevention

Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Strata Cloud Manager)
  • NGFW (Managed by PAN-OS or Panorama)
  • VM-Series
  • CN-Series
  • Advanced Threat Prevention (for enhanced feature support) or Threat Prevention License
Palo Alto Networks provides several options to monitor activity processed by Advanced Threat Prevention to accommodate intelligence retrieval for a range of products that rely on Advanced Threat Prevention and the associated data. Depending on the product platform, you can access high-level dashboards that also provide DNS request statistics and usage trends, including context into network activity, and DNS request details from specific users.
You can also view how Advanced Threat Prevention integrates with other Palo Alto Networks applications and security services to protect your organization from threats, as well as get a high-level view of the overall operational health of your deployment, through the Strata Cloud Manager Command Center. The command center functions as your NetSec homepage and provides a comprehensive summary of the health, security, and efficiency of your network, in an interactive visual dashboard with multiple data facets for easy, at-a-glace assessment.
For a high-level view of network activity, you can view the dashboard which provides visibility into the network’s overall threat management data as well as various DNS trends. Each dashboard card provides a unique view into a threat’s impact to your network, in a graphical report format. This provides an at-a-glace insight into the entities which are most affected by threats, based on application, user, as well as which security rules are enforcing your organization’s policies.
Palo Alto Networks provides several methods to monitor the threat activity: