Displays an overview of traffic and user
activity on your network including: Top applications
in use Top users who generate traffic (with a drill down into the
bytes, content, threats or URLs accessed by the user) Most used security rules against which traffic matches occur
In
addition, you can also view network activity by source or destination
zone, region, or IP address, ingress or egress interfaces, and GlobalProtect
host information such as the operating systems of the devices most
commonly used on the network. |