Strata Cloud Manager
Post-Change Policy Analysis
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
-
- Strata Copilot
- Command Center: Strata Cloud Manager
-
- Dashboard: Build a Custom Dashboard
- Dashboard: Executive Summary
-
- WildFire Dashboard: Filters
- WildFire Dashboard: Total Samples Submitted
- WildFire Dashboard: Analysis Insights
- WildFire Dashboard: Session Trends For Samples Submitted
- WildFire Dashboard: Verdict Distribution
- WildFire Dashboard: Top Applications Delivering Malicious Samples
- WildFire Dashboard: Top Users Impacted By Malicious Samples
- WildFire Dashboard: Top Malware Regions
- WildFire Dashboard: Top Firewalls
- Dashboard: DNS Security
- Dashboard: AI Runtime Security
- Dashboard: IoT Security
- Dashboard: Prisma Access
-
- Application Experience Dashboard: Mobile User Experience Card
- Application Experience Dashboard: Remote Site Experience Card
- Application Experience Dashboard: Experience Score Trends
- Application Experience Dashboard: Experience Score Across the Network
- Application Experience Dashboard: Global Distribution of Application Experience Scores
- Application Experience Dashboard: Experience Score for Top Monitored Sites
- Application Experience Dashboard: Experience Score for Top Monitored Apps
- Application Experience Dashboard: Application Performance Metrics
- Application Experience Dashboard: Network Performance Metrics
- Dashboard: Best Practices
- Dashboard: Compliance Summary
-
- Prisma SD-WAN Dashboard: Device to Controller Connectivity
- Prisma SD-WAN Dashboard: Applications
- Prisma SD-WAN Dashboard: Top Alerts by Priority
- Prisma SD-WAN Dashboard: Overall Link Quality
- Prisma SD-WAN Dashboard: Bandwidth Utilization
- Prisma SD-WAN Dashboard: Transaction Stats
- Prisma SD-WAN Dashboard: Predictive Analytics
- Dashboard: PAN-OS CVEs
- Dashboard: CDSS Adoption
- Dashboard: Feature Adoption
- Dashboard: On Demand BPA
- Manage: IoT Policy Recommendation
- Manage: Enterprise DLP
- Manage: SaaS Security
- Manage: Prisma Access Browser
- Reports: Strata Cloud Manager
-
-
- Strata Cloud Manager Release Information
-
- New Features in February 2025
- New Features in January 2025
- New Features in December 2024
- New Features in November 2024
- New Features in October 2024
- New Features in September 2024
- New Features in August 2024
- New Features in July 2024
- New Features in June 2024
- New Features in May 2024
- New Features in April 2024
- New Features in March 2024
- New Features in February 2024
- New Features in January 2024
- New Features in November 2023
- New Features in October 2023
- New Features in September 2023
- Known Issues
- Addressed Issues
- Getting Help
Post-Change Policy Analysis
Provides information about post-change policy analysis.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Strata Cloud Manager analyzes device configurations as soon as you push them,
detecting anomalies. It also performs an analysis every 4 hours. For Panorama managed
configurations, Strata Cloud Manager performs the analysis when you commit the
configuration on Panorama. Policy Analyzer analyzes this configuration for Shadows,
Redundancies and other anomalies, and the results are available for review in ManageSecurity PosturePolicy AnalyzerPost-change Policy Analysis.
You can view the following information:
- Shows the summary of the analysis across all the policy sets, that is, all the device groups with NGFWs directly assigned to them. You can view the anomalies or the anomalies based on high priority. The values in this report show the unique number of anomalies found in all the device groups. The colors in the chart indicate the different types of anomalies.
- Timestamps for analysis that includes:
- Existing Security policy snapshot - The timestamp for when the configuration was marked as running in Panorama following a commit, or the timestamp for when the configuration was marked as running in Strata Cloud Manager after a push.
- Time analysis started
- Time analysis finished
- The time it took to complete the analysis
- View the status of the Security policy and the number of anomalies for every policy.
- View a breakdown of anomalies for a selected Security policy.
- View anomaly details for every rule in a Security policy.
- View the attributes of a selected rule and the details of the anomaly.This image shows an example of the redundancy anomaly. In this example, the BND rule is already covered by another BND Users rule. Therefore, you can remove the BND rule.
- View the suggested next steps to remediate an anomaly.