Strata Cloud Manager
Dashboard: AI Runtime Security
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
-
- Strata Copilot
- Command Center: Strata Cloud Manager
-
- Dashboard: Build a Custom Dashboard
- Dashboard: Executive Summary
-
- WildFire Dashboard: Filters
- WildFire Dashboard: Total Samples Submitted
- WildFire Dashboard: Analysis Insights
- WildFire Dashboard: Session Trends For Samples Submitted
- WildFire Dashboard: Verdict Distribution
- WildFire Dashboard: Top Applications Delivering Malicious Samples
- WildFire Dashboard: Top Users Impacted By Malicious Samples
- WildFire Dashboard: Top Malware Regions
- WildFire Dashboard: Top Firewalls
- Dashboard: DNS Security
- Dashboard: AI Runtime Security
- Dashboard: IoT Security
- Dashboard: Prisma Access
-
- Application Experience Dashboard: Mobile User Experience Card
- Application Experience Dashboard: Remote Site Experience Card
- Application Experience Dashboard: Experience Score Trends
- Application Experience Dashboard: Experience Score Across the Network
- Application Experience Dashboard: Global Distribution of Application Experience Scores
- Application Experience Dashboard: Experience Score for Top Monitored Sites
- Application Experience Dashboard: Experience Score for Top Monitored Apps
- Application Experience Dashboard: Application Performance Metrics
- Application Experience Dashboard: Network Performance Metrics
- Dashboard: Best Practices
- Dashboard: Compliance Summary
-
- Prisma SD-WAN Dashboard: Device to Controller Connectivity
- Prisma SD-WAN Dashboard: Applications
- Prisma SD-WAN Dashboard: Top Alerts by Priority
- Prisma SD-WAN Dashboard: Overall Link Quality
- Prisma SD-WAN Dashboard: Bandwidth Utilization
- Prisma SD-WAN Dashboard: Transaction Stats
- Prisma SD-WAN Dashboard: Predictive Analytics
- Dashboard: PAN-OS CVEs
- Dashboard: CDSS Adoption
- Dashboard: Feature Adoption
- Dashboard: On Demand BPA
- Manage: IoT Policy Recommendation
- Manage: Enterprise DLP
- Manage: SaaS Security
- Manage: Prisma Access Browser
- Reports: Strata Cloud Manager
-
-
- Strata Cloud Manager Release Information
-
- New Features in February 2025
- New Features in January 2025
- New Features in December 2024
- New Features in November 2024
- New Features in October 2024
- New Features in September 2024
- New Features in August 2024
- New Features in July 2024
- New Features in June 2024
- New Features in May 2024
- New Features in April 2024
- New Features in March 2024
- New Features in February 2024
- New Features in January 2024
- New Features in November 2023
- New Features in October 2023
- New Features in September 2023
- Known Issues
- Addressed Issues
- Getting Help
Dashboard: AI Runtime Security
Use the AI Runtime Security dashboard in Strata Cloud Manager (SCM) to understand the
cloud assets discovery and AI traffic network flows.
Where Can I Use This? | What Do I Need? |
---|---|
|
Discover Cloud Resources
The Cloud Application
Command Center in SCM under Insights →
AI Runtime Security provides actionable insights into
discovering all the cloud assets in your onboarded cloud account.
The assets discovery on the SCM dashboard is classified into the
operational view and security view.
The discovery shows the
threats breakdown based on threat urgency and risk categories such as
vulnerability detection, URL Security, and Prompt Injection.
- The Operational view is an aggregated view of:
- A total count and breakdown of assets discovered in your onboarded cloud environments
- Traffic flows - protected and unprotected by AI Runtime Security instance
- Application workloads (Containers, Serverless functions, and VMs)
- AI models being queried
- User applications accessing the internet destinations
- Application users applications being accessed from external applications
- Inbound and outbound traffic statistics
- In Security view:
- You can add an (“+” icon) AI Runtime Security instance to protect the unprotected network traffic as identified in the operational view.
- If the AI Runtime Security instance protection already exists, redirect the unprotected traffic through the available AI Runtime Security instance.
Next, detect the risky network flow paths between the user apps, AI
models, and the internet. See AI Traffic Network Risk
Analysis and Deploy an AI Runtime Security
instance to monitor and defend your cloud network
architecture.