Strata Cloud Manager
Dashboard: Executive Summary
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
-
- Strata Copilot
- Command Center: Strata Cloud Manager
-
- Dashboard: Build a Custom Dashboard
- Dashboard: Executive Summary
-
- WildFire Dashboard: Filters
- WildFire Dashboard: Total Samples Submitted
- WildFire Dashboard: Analysis Insights
- WildFire Dashboard: Session Trends For Samples Submitted
- WildFire Dashboard: Verdict Distribution
- WildFire Dashboard: Top Applications Delivering Malicious Samples
- WildFire Dashboard: Top Users Impacted By Malicious Samples
- WildFire Dashboard: Top Malware Regions
- WildFire Dashboard: Top Firewalls
- Dashboard: DNS Security
- Dashboard: AI Runtime Security
- Dashboard: IoT Security
- Dashboard: Prisma Access
-
- Application Experience Dashboard: Mobile User Experience Card
- Application Experience Dashboard: Remote Site Experience Card
- Application Experience Dashboard: Experience Score Trends
- Application Experience Dashboard: Experience Score Across the Network
- Application Experience Dashboard: Global Distribution of Application Experience Scores
- Application Experience Dashboard: Experience Score for Top Monitored Sites
- Application Experience Dashboard: Experience Score for Top Monitored Apps
- Application Experience Dashboard: Application Performance Metrics
- Application Experience Dashboard: Network Performance Metrics
- Dashboard: Best Practices
- Dashboard: Compliance Summary
-
- Prisma SD-WAN Dashboard: Device to Controller Connectivity
- Prisma SD-WAN Dashboard: Applications
- Prisma SD-WAN Dashboard: Top Alerts by Priority
- Prisma SD-WAN Dashboard: Overall Link Quality
- Prisma SD-WAN Dashboard: Bandwidth Utilization
- Prisma SD-WAN Dashboard: Transaction Stats
- Prisma SD-WAN Dashboard: Predictive Analytics
- Dashboard: PAN-OS CVEs
- Dashboard: CDSS Adoption
- Dashboard: Feature Adoption
- Dashboard: On Demand BPA
- Manage: IoT Policy Recommendation
- Manage: Enterprise DLP
- Manage: SaaS Security
- Manage: Prisma Access Browser
- Reports: Strata Cloud Manager
-
-
- Strata Cloud Manager Release Information
-
- New Features in February 2025
- New Features in January 2025
- New Features in December 2024
- New Features in November 2024
- New Features in October 2024
- New Features in September 2024
- New Features in August 2024
- New Features in July 2024
- New Features in June 2024
- New Features in May 2024
- New Features in April 2024
- New Features in March 2024
- New Features in February 2024
- New Features in January 2024
- New Features in November 2023
- New Features in October 2023
- New Features in September 2023
- Known Issues
- Addressed Issues
- Getting Help
Dashboard: Executive Summary
See exactly how your Palo Alto Networks subscriptions protect you.
Where Can I Use This? | What Do I Need? |
---|---|
|
Each of these licenses include access to Strata Cloud Manager:
The other licenses and prerequisites needed for visibility
are:
→ The features and capabilities available to you in Strata Cloud Manager depend on which license(s) you are
using.
|
- Click Strata Cloud ManagerDashboardsMore DashboardsExecutive Summary to get started.
What does this dashboard show you?
The dashboard shows aggregated data per Strata Logging Service tenant.
The Executive Summary dashboard shows you how your Palo Alto Networks security
subscriptions are protecting you. This report breaks down malicious activity in
your network that these subscriptions are detecting:
WildFire, Advanced Threat
Prevention, Advanced URL Filtering, and
Enterprise DLP. The dashboard shows data for each of
these service with links to security services dashboards to dive deeper for
further investigation.
This dashboard supports reports. These icons,
in the top right of a dashboard indicate that
reports are supported for this dashboard. You can share, download, and schedule
reports that cover the data this dashboard displays.

How can you use the data from dashboard?
- Review all the malicious activity that the active Palo Alto Networks subscriptions are detecting. See if you need to refine the subscription settings or security rule settings to close any security gaps.
- Shows you industry data to gives you perspective on the threat landscape you’re facing and how you stack up against your peers.
The dashboard provides the following data.
Executive Summary Dashboard: Your Security
Subscriptions
| This report gives you the numbers on the
malicious activity your subscriptions are detecting and
preventing:
![]() |
Executive Summary Dashboard: Application Usage | Review the traffic logs for high-risk
applications and see how you can strengthen the security
posture. ![]() |
Executive Summary Dashboard: Advanced Threat
Prevention
Requires Advanced Threat Prevention
license. | Examine the security policy rules that allow most threats. Review these rules to see where you can enable stricter threat enforcement. Learn more. |
Executive Summary Dashboard: URL
Filtering Requires Advanced
URL Filtering license. | Review the malicious web activity in your
network, particularly the number of malicious web sites that
your users are attempting to access. ![]() |
Executive Summary Dashboard: WildFire
Requires Advanced WildFire
license. |
Peer data in this dashboard gives you a view into your
industry’s threat landscape and how your security coverage
compares to similar organizations. This industry data is
also shown for subscriptions you’re not using; this helps
you to see if there are places where you can increase
coverage to close security gaps.
Here’s a close-up of the kind of data this dashboard
provides—here, you can see the work WildFire is doing to
protect your network and your industry. Learn more. ➡
![]() |
Executive Summary Dashboard: Enterprise DLP
Requires Enterprise DLP
license. | See how your Palo Alto Networks
Enterprise DLP service is protecting your data by enforcing
data security standards. The dashboard gives insights into
the applications to which most uploads are prevented by DLP
and the total number of files that are blocked by DLP in
your network. You can also use this data to compare with
your industry peers and benchmark your security posture
standards. Review the applications and source
usernames to better understand where the DLP incidents
originated and manage them. ![]() |