Dashboard Widgets
Table of Contents
11.0 (EoL)
Expand all | Collapse all
-
- Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > Interfaces > PoE
- Network > VLANs
- Network > Virtual Wires
-
- Network > Routing > Logical Routers > General
- Network > Routing > Logical Routers > Static
- Network > Routing > Logical Routers > OSPF
- Network > Routing > Logical Routers > OSPFv3
- Network > Routing > Logical Routers > RIPv2
- Network > Routing > Logical Routers > BGP
- Network > Routing > Logical Routers > Multicast
-
- Network > Routing > Routing Profiles > BGP
- Network > Routing > Routing Profiles > BFD
- Network > Routing > Routing Profiles > OSPF
- Network > Routing > Routing Profiles > OSPFv3
- Network > Routing > Routing Profiles > RIPv2
- Network > Routing > Routing Profiles > Filters
- Network > Routing > Routing Profiles > Multicast
- Network > Proxy
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > ACE
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > IoT > DHCP Server
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > SCP
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
-
- Device > User Identification > Connection Security
- Device > User Identification > Terminal Server Agents
- Device > User Identification > Group Mapping Settings
- Device > User Identification> Trusted Source Address
- Device > User Identification > Authentication Portal Settings
- Device > User Identification > Cloud Identity Engine
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Firewall Clusters
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
End-of-Life (EoL)
Dashboard Widgets
By default, the Dashboard displays
widgets in a Layout of 3 Columns but
you can customize the Dashboard to display
only 2 Columns, instead.
You can also decide which widgets to display or hide so that
you see only those you want to monitor. To display a widget, select
a widget category from the Widgets drop-down
and select a widget to add it to the Dashboard (widget names that
appear in faded grayed-out text are already displayed). Hide (stop
displaying) a widget by closing the widget (
in the
widget header). The firewalls and Panorama save your widget display
settings across logins (separately for each administrator).
Refer to the Last updated timestamp to
determine when the Dashboard data was last refreshed. You can manually
refresh the entire Dashboard (
in the
top right corner of the Dashboard) or you can refresh individual
widgets (
within
each widget header). Use the unlabeled drop-down next to the manual
Dashboard refresh option (
) to
select the automatic refresh interval for the entire Dashboard (in
minutes): 1 min, 2
mins, or 5 mins; to disable automatic refresh
for the entire Dashboard, select Manual.
Dashboard Widgets | Description |
---|---|
Application Widgets | |
Top Applications | Displays the applications with the most
sessions. The block size indicates the relative number of sessions
(mouse over the block to view the number), and the color indicates
the security risk—from green (lowest) to red (highest). Click an
application to view its application profile. |
Top High Risk Applications | Similar to Top Applications except that
it displays the highest-risk applications with the most sessions. |
ACC Risk Factor | Displays the average risk factor (1-5) for
the network traffic processed over the past week. Higher values
indicate higher risk. |
System Widgets | |
General Information | Displays the firewall or Panorama name and
model, the Panorama CPU and RAM, the Panorama system mode, the PAN-OS®
or Panorama software version, the IPv4 and IPv6 management IP information,
the serial number, the CPU ID and UUID, the application, threat,
and URL filtering definition versions, the current date and time,
and the length of time since the last restart. |
Interfaces (Firewall only) | Indicates whether each interface is up (green),
down (red), or in an unknown state (gray). Interfaces that support
Power over Ethernet (PoE) are marked with a lightning bolt icon.
Hovering the mouse cursor over an interface displays link configuration
and status information. Additional details such as link speed, link
duplex, and PoE information are displayed based on the port type. |
System Resources | Displays the Management CPU usage, Data
Plane usage, and the Session Count (the number of sessions established
through the firewall or Panorama). |
High Availability | Indicates—when high availability (HA) is
enabled—the HA status of the local and peer firewall/Panorama—green
(active), yellow (passive), or black (other). For more information
about HA, refer to Device > High Availability or Panorama
> High Availability. |
HA Cluster | When HA Cluster is enabled, indicates cluster
statistics and also the Keep Alive value for HA4 and HA4_backup
links for each member in the cluster. |
Locks | Shows configuration locks that administrators
have set. |
Logged In Admins | Displays the source IP address, session
type (web interface or CLI), and session start time for each administrator
who is currently logged in. |
PoE Power Budget (Supported firewalls only) | Displays the Total Power Budget and Total
Allocated Power of configured interfaces when using power over Ethernet.
The donut chart confirms the available power on the firewall and
helps you decide which powered devices (PDs) to connect to the PoE
ports. |
Logs Widgets | |
Threat Logs | Displays the threat ID, application, and
date and time for the last 10 entries in the Threat log. The threat
ID is a malware description or URL that violates the URL filtering
profile. Displays only entries from the last 60 minutes. |
URL Filtering Logs | Displays the description and date and time
for the last 60 minutes in the URL Filtering log. |
Data Filtering Logs | Displays the description and date and time
for the last 60 minutes in the Data Filtering log. |
Config Logs | Displays the administrator username, client
(web interface or CLI), and date and time for the last 10 entries
in the Configuration log. Displays only entries from the last 60
minutes. |
System Logs | Displays the description and date and time
for the last 10 entries in the System log. A “Config
installed” entry indicates configuration changes were committed
successfully. Displays only entries from the last 60 minutes. |