Strata Cloud Manager AIOps
Strata Cloud Manager AIOps
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2023-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
May 24, 2023
5
AIOps for NGFW
The region that you select when you activate AIOps for NGFW determines the physical location
in which AIOps processes your data.
AIOps for NGFW is not offered in all the regions where the Strata Logging Service (SLS)
infrastructure is supported. AIOps for NGFW deployment will expand to additional regions soon
to match the telemetry data destinations. Currently, if you send your telemetry data to a region
where the AIOps application is not supported, your data will be processed by an AIOps for NGFW
instance in the United States-Americas region.
When you activate AIOps for NGFW, these restrictions are applied automatically. For example,
if you select Germany as the region to activate an instance of AIOps for NGFW, only Germany-
based SLS tenants can be attached to that instance.
• The same regions that support AIOps for NGFW also support NGFWs in Strata Cloud
Manager.
• If your telemetry data is sent to a region different from the AIOps for NGFW
application's region, you might experience delays in telemetry processing and reduced
data visibility within your application.
Refer to the following table to understand the AIOps data processing for the various telemetry
destination regions.
Strata Logging Service Region Supported Region for an AIOps for NGFW Instance to
Process Data
Germany Germany
Strata Logging Service Region Supported Region for an AIOps for NGFW Instance to
Process Data
Korea Korea
Indonesia Indonesia
Israel Israel
Taiwan Taiwan
Qatar Qatar
Singapore Singapore
Australia Australia
India India
Japan Japan
Canada Canada
AIOps for NGFW comes in two license tiers: free and premium.
Free AIOps for NGFW features enrich your understanding of your firewall deployment.
Free features:
• assess the firewall’s configuration and identify areas for improvement
• provide easy access to runtime and historical telemetry data from firewalls
• detect system issues (independent of the detection method)
• reduce time to resolution through alert/notification workflows
• provide dynamic dashboards and visualizations for several security subscriptions
With a premium tier license, you have access to both free and premium features. Premium
features focus on ensuring full utilization and maximal security outcome from your firewalls.
Premium features:
• Cloud management for NGFWs
Contact your account team to enable Cloud Management for NGFWs using Strata
Cloud Manager.
• use advanced ML techniques to promote an always-optimal security posture that responds to
the changing threat and network landscapes, thereby reducing the attack surface
• provide dynamic dashboards and visualizations for WildFire and IOC Search
• interact with data and visualize the relationships between events on the network in the Strata
Cloud Manager Command Center to uncover anomalies or find ways to enhance your network
security
Strata Cloud Manager has two licensing tiers: Strata Cloud Manager Essentials and Strata
Cloud Manager Pro. This unified structure streamlines the deployment of network security
offerings, including AIOps for NGFW, Autonomous Digital Experience Management
(ADEM), cloud management functionality, and Strata Logging Service. See Strata Cloud
Manager License.
Palo Alto Networks has announced May 8, 2025, as the end-of-sale date for the AIOps
for NGFW Premium licenses. Starting in March 2025, existing customers with these
licenses will be automatically migrated to alternative licenses in phases at no additional
cost.
• AIOps for NGFW Free customers → Migrated to Strata Cloud Manager Essentials.
Following the migration, the AIOps for NGFW Free tile will not be available on hub.
Instead, you need to use the Strata Cloud Manager tile to access the features.
• AIOps for NGFW Premium customers → Migrated to Strata Cloud Manager Pro.
New capabilities in the product, across all feature categories, will be assigned to the Free
and Premium tiers based solely on the discretion of Palo Alto Networks.
Here are the different scenarios for activating AIOps for NGFW:
Scenario Plan
Activating AIOps for NGFW Free Activate AIOps for NGFW (Free)
Activating AIOps for NGFW Premium (use Activate AIOps for NGFW Through Common
Strata Cloud Manager app) Services
Activating ELA AIOps for NGFW Premium Activate Enterprise License Agreement (ELA)
AIOps for NGFW Premium
Using Strata Cloud Manager (AIOps for Activate a Software NGFW Credits License
NGFW Premium) to manage VM-Series Agreement
Using Strata Cloud Manager (AIOps for Activate a Software NGFW Credits License
NGFW Premium) for Panorama Managed VM- for Panorama Managed VM-Series
Series
Converting AIOps for NGFW Premium trial Convert Trial License to Production
license to production
Activate Strata Cloud Manager Essentials and • Activate Strata Cloud Manager Essentials
Strata Cloud Manager Pro • Activate Strata Cloud Manager Pro
Strata Cloud Manager is available, featuring two licensing tiers: Strata Cloud Manager Essentials
and Strata Cloud Manager Pro. This unified structure streamlines the deployment of network
security offerings, including AIOps for NGFW, Autonomous Digital Experience Management
(ADEM), cloud management functionality, and Strata Logging Service.
Strata Cloud Manager Essentials replaces AIOps for NGFW Free, offering access to all the AIOps
for NGFW Free features and additional capabilities. Strata Cloud Manager Essentials and Strata
Cloud Manager Pro are available to activate in customer support portal (CSP) accounts that don't
have: Strata Logging Service with sized storage, AIOps for NGFW Free or Premium, or Prisma
Access.
Palo Alto Networks has announced May 8, 2025, as the end-of-sale date for the AIOps for
NGFW Premium licenses. Starting in March 2025, existing customers with these licenses will be
automatically migrated to alternative licenses in phases at no additional cost.
• AIOps for NGFW Free customers → Migrated to Strata Cloud Manager Essentials. Following
the migration, the AIOps for NGFW Free tile will not be available on hub. Instead, you need to
use the Strata Cloud Manager tile to access the features.
• AIOps for NGFW Premium customers → Migrated to Strata Cloud Manager Pro.
FedRAMP accounts can't use AIOps for NGFW. To check if this applies to you, sign in to
your Customer Support Portal account and select Account Management > Account
Details. If you see a FedRamp Account listed, then you cannot use AIOps for NGFW.
Strata Logging Service The Strata Logging Service from which you
want to send data to AIOps for NGFW Free.
6. Associate devices to a tenant containing your AIOps for NGFW Free instance.
1. Log in to the hub.
2. Select Common Services > Device Associations.
• For AIOps for NGFW Free activation, associating apps with devices isn't required.
• You can associate devices to a tenant at the beginning of activation if you already
have an existing tenant.
• You can remove device associations if, for example, you are retiring or returning a
firewall or Panorama appliance, or if you want to associate it with another tenant
service group (TSG).
7. Enable telemetry on devices.
1. Confirm the device is registered in the Customer Support Portal by logging in to
support.paloaltonetworks.com, switch to your account (if necessary), and identify your
device in Assets > Devices.
2. Install a device certificate on the devices you want to onboard.
3. Enable telemetry sharing on the devices.
After you onboard the devices and enable telemetry, it takes around a couple of
hours for the first set of insights to be visible on the AIOps for NGFW dashboard.
The process of generating and sending telemetry on the device's side is done in
batches, with each metric being sampled and collected at a frequency optimized for
the use cases the metric is used for. This batch process can result in a delay between
onboarding the firewall and the availability of insights. It might take several hours
for all insights associated with a newly onboarded device to appear on the AIOps for
NGFW dashboard.
8. Log in to AIOps for NGFW Free by clicking on its icon in the hub.
Palo Alto Networks Strata Cloud Manager is a new AI-Powered, unified network security
management platform. Now, you can use Strata Cloud Manager to interact with and manage
AIOps for NGFW together with your other Palo Alto Networks products and subscriptions.
To launch Strata Cloud Manager:
• Go to the hub and launch the Strata Cloud Manager app
• Go directly to the Strata Cloud Manager URL
• Strata Cloud Manager provides unified management and operations only for
NGFWs using the AIOps for NGFW Premium license. The application tile name
on the hub for AIOps for NGFW (the premium app only) is now changed to Strata
Cloud Manager. With this update, the application URL has also changed to
stratacloudmanager.paloaltonetworks.com, and you’ll also now see the Strata Cloud
Manager logo on the left navigation pane. Continue to use the AIOps for NGFW Free
app for the NGFWs onboarded to AIOps for NGFW Free.
• Contact your account team to enable Cloud Management for NGFWs using Strata
Cloud Manager.
If you've previously used the AIOps for NGFW app, here's where you can find your features in
Strata Cloud Manager:
Table 1:
AIOps for NGFW App Where to find these same features in Strata
Cloud Manager:
AIOps for NGFW App Where to find these same features in Strata
Cloud Manager:
AIOps for NGFW App Where to find these same features in Strata
Cloud Manager:
• On-Demand BPA dashboard
• Feature Adoption dashboard
• Compliance Summary dashboard
AIOps for NGFW App Where to find these same features in Strata
Cloud Manager:
AIOps for NGFW App Where to find these same features in Strata
Cloud Manager:
• NGFW, including those funded by AIOps for NGFW Premium or Strata Cloud
Software NGFW Credits Manager Pro
Want to proactively check your policy rules for adherence to best practices? You should not
have to wait to get an alert and then fix a problem after you’ve pushed your policy rules. Connect
AIOps for NGFW or Strata Cloud Manager to your Panorama to evaluate your configuration
against certain best practice checks before pushing it to your managed firewalls. See Proactively
Enforcing Security Checks.
Updates to your Security policy rules are often time-sensitive and require you to act quickly.
However, you want to ensure that any update you make to your security policy rulebase meets
your requirements and does not introduce errors or misconfigurations (such as changes that result
in duplicate or conflicting rules).
To achieve this, the Policy Analyzer in Strata Cloud Manager enables you to optimize time and
resources when implementing a change request. Policy Analyzer not only analyzes and provides
suggestions for possible consolidation or removal of specific rules to meet your intent but
also checks for anomalies, such as Shadows, Redundancies, Generalizations, Correlations and
Consolidations in your rulebase.
Connect AIOps for NGFW or Strata Cloud Manager to your Panorama and use Policy Analyzer to
add or optimize your Security policy rulebase. See Policy Analyzer.
You’ll need these things to connect AIOps for NGFW to your Panorama:
AIOps for NGFW or Strata Cloud Manager instance: You don't need an AIOps for NGFW
Premium license to install the Panorama CloudConnector plugin. However, the Premium
license is required to use premium features like the Policy Analyzer and Proactive Best Practice
Assessment (BPA).
The Panorama CloudConnector Plugin installed on your Panorama running PAN OS 10.2.3 and
above.
You need to enable this plugin using the command:
> request plugins cloudconnector enable basic
• To help customers, we have preinstalled this plugin with newer Panorama versions
(11.0.1 and above).
• If you have already installed both the AIOps plugin and the CloudConnector plugin,
uninstall the AIOps plugin, as they are identical and only the name has changed.
Ensure that you have only one plugin installed, which should be the latest version of
the CloudConnector plugin.
If you installed the AIOps plugin on PAN-OS 10.2.3 and then upgraded to PAN-OS 11.0.1 or
later, a default version of the plugin will be installed with the new PAN-OS version. This results
in both plugins being present on Panorama. In this case, follow these steps:
1. In the Panorama web interface, select Panorama > Plugins and Uninstall the AIOps plugin.
2. Enable the CloudConnector plugin:
> request plugins cloudconnector enable basic
CloudConnector plugin 2.2.0 supports proxy configuration settings from Panorama. These
settings only take effect after a commit. Here are the scenarios:
• Configuring Proxy Settings: When you configure proxy settings and perform a commit, the
CloudConnector plugin won't recognize the new proxy settings during this commit. After
the commit, the plugin will use the proxy configuration for future interactions with the
cloud.
• Removing Proxy Settings: When you remove proxy settings and perform a commit,
the CloudConnector plugin won't recognize the removed proxy settings during the
commit. After the commit, the plugin will no longer use the proxy configuration for future
interactions with the cloud.
A security policy rule that allows communication between Panorama and the FQDN that
corresponds to your Strata Logging Service host region:
Integrating Strata Cloud Manager into your existing operations involves setting up proactive
alerts, allowing you to detect and manage potential issues before they escalate into serious
complications. These alerts can be tailored to match your operations team's case management
protocol, such as the commonly used P1s or P2s.
For instance, you might set up an alert system wherein critical alerts, which represent the most
critical issues, are instantaneously escalated to your security team for immediate attention. On
the other hand, warning alerts, which are of lesser urgency but still significant, can be arranged for
daily review. Such an arrangement ensures efficient incident management while maintaining the
smooth running of your operations.
Another option is to route alerts based on teams; certain categories of alerts, or even specific
alerts, can be routed to different teams that will be best equipped to handle them. You can define
notification preferences, such as which alerts trigger notifications, how you receive notifications,
and how often you receive them, create a notification rule.
Here is a video that shows how to create a notification rule.
STEP 1 | Select Incidents & Alerts > Incident & Alert Settings > Notification Rules > + Add
Notification Rule
STEP 3 | Add New Condition to specify the Rule Conditions that will trigger the notification.
For example, to create a notification for hardware alerts, select subCategory, Equals, and
Hardware.
• NGFW, including those funded by AIOps for NGFW Premium or Strata Cloud
Software NGFW Credits Manager Pro
Strata Logging Service license is required
for logging
If you have a Prisma Access license, you
can use Folder Management to view
your predefined folders and enable Web
Security for a folder
Troubleshoot your NGFWs from Strata Cloud Manager without having to move between various
firewall interfaces. If you experience connectivity issues after deploying and configuring your
NGFWs, you can get an aggregate view of your routing and tunnel states, and drill down to
specifics to find anomalies and problematic configurations.
Troubleshoot your identity-based policy rules and dynamically defined endpoints. You can check
the status of specific NGFWs and expose possible mismatches between how you expect a policy
to work and its actual enforcement behavior.
Troubleshooting lets you drill down on issue that might arise within these networking and identity
features–track down and resolve connectivity issues or policy enforcement anomalies:
Network Troubleshooting
• NAT
• DNS Proxy
Identity and Policy Troubleshooting
• User Groups
• Dynamic Address Groups
• Dynamic User Groups
• User ID
Firewall Troubleshooting
• Session Browser
Go to Manage > Configuration > NGFW and Prisma Access > Operations > Troubleshooting >
Session Browser to start troubleshooting your firewalls.
Or, you can go to the feature you want to troubleshoot and select the Troubleshooting button to
get started.
View and sort troubleshooting jobs you've run by Status, Action, Search Target, and Timestamp.
• Destination
Port
• App-ID
2. Prepare Metadata.
AIOps for NGFW assesses the health of the firewalls in your deployment by analyzing telemetry
data that your PAN-OS devices send to Strata Logging Service. To send this data, you must have
enabled device telemetry on your devices.
Once telemetry is configured, your next-generation firewalls send raw telemetry data to
Strata Logging Service at fixed intervals. Strata Logging Service parses and translates this raw data
so that AIOps for NGFW can provide you with device status, visualizations, and alerts.
Onboard your devices to begin sending device telemetry to AIOps for NGFW.
35
Device Telemetry for AIOps for NGFW
If your outbound traffic passes through a proxy, ensure that you have allowed the Domains
Required for AIOps for NGFW.
You need to onboard Panorama on AIOps for NGFW if you are onboarding Panorama-
managed deployments.
After you onboard the devices and enable telemetry, it takes around couple of hours
for the first set of insights to be visible on the AIOps for NGFW dashboard. The
process of generating and sending telemetry on the device's side is done in batches,
with each metric being sampled and collected at a frequency optimized for the
use-cases the metric is used for. This batch process can result in a delay between
onboarding the firewall and the availability of insights. It might take several hours
for all insights associated with a newly onboarded device to appear on the AIOps for
NGFW dashboard.
If outbound traffic from your devices passes through a proxy, ensure that you have allowed the
following FQDNs in order to successfully use AIOps for NGFW.
Region Domain
US http://br-prd1.us.cdl.paloaltonetworks.com/
Europe http://br-prd1.nl.cdl.paloaltonetworks.com/
UK http://br-prd1.uk.cdl.paloaltonetworks.com/
Canada http://br-
prd1.ca1.ne1.cdl.paloaltonetworks.com/
Singapore http://br-
prd1.sg1.se1.cdl.paloaltonetworks.com/
Region Domain
Japan http://br-
prd1.jp1.ne1.cdl.paloaltonetworks.com/
Australia http://br-
prd1.au1.se1.cdl.paloaltonetworks.com/
Germany http://br-
prd1.de1.ew3.cdl.paloaltonetworks.com/
India http://br-
prd1.in1.as1.cdl.paloaltonetworks.com/
In addition to helping you keep your firewalls functionally healthy, AIOps for NGFW aids in
verifying that they are providing you with effective protection against security threats.
Security posture assessments currently don't support multiple virtual systems; only the
default virtual system (vsys1) is considered during configuration processing.
• Monitor Security Posture Insights: Get visibility into the security status and trend of your
deployment based on the security postures of the onboarded NGFW devices.
• Monitor Feature Adoption: View the security features that you're using in your deployment.
• Monitor Security Subscriptions: View the recommended Cloud-Delivered Security Services
(CDSS) subscriptions and their usage in your devices.
• Assess Vulnerabilities: View the vulnerabilities impacting a specific firewall and PAN-OS
version, aiding in your decision-making process regarding whether an upgrade is necessary.
• Monitor Compliance Summary: View a history of changes to the security checks made up to 12
months in the past, grouped together by the Center for Internet Security (CIS) and the National
Institute of Standards and Technology (NIST) frameworks.
• Proactively Enforce Security Checks: Take proactive measures against suboptimal
configurations by blocking commits that don't pass particular best practice checks.
• Policy Analyzer: Get analysis and suggestions for possible consolidation or removal of specific
policy rules to meet your intended Security posture, as well as checks for anomalies, such as
shadows, redundancies, generalizations, correlations, and consolidations in your rulebase.
39
Optimize Security Posture
You can use the Security Posture Insights dashboard to get visibility into the security status
and trend of your deployment based on the security postures of the onboarded NGFW devices.
The severity of the security score (0-100) and its corresponding security grade (good, fair, poor,
critical) determine the security posture of a device. The security score is calculated based on the
priority, quantity, type, and status of the open alerts.
1. Navigate to Dashboards > Security Posture Insights to get started.
2. View the health of your devices using the Device Security Posture. You can view the following:
• The total number of onboarded NGFWs.
• The number of devices that have not sent telemetry data for over 12 hours.
• The priority of security score for the onboard devices in your deployment. Click the number
link to know the device details and security statistics.
For example, you can view 7 critical risks for all the devices.
In this case, you can click on the critical alerts and see the devices that generate alerts. You can
further drill down and notice that the “User credential protection” has not been enabled on the
firewalls. You can address this issue across all devices to avoid phishing attacks.
3. Review your devices that are most unhealthy and regressing security scores over the last 30
days. You can view the health of your devices, including their operational status, software
version, and other important metrics.
You can also notice if some devices are running outdated software versions. In this case, you
can plan an upgrade to the latest recommended version, which you can find out by Upgrade
Recommendations.
4. Check the security posture trend of your deployment for the selected time period. Hover over
the trigger point to know the devices and active alerts that are contributing to the security
posture trend. You can view trends for one or more devices filtered by the hostname, model, or
software version.
For more information, see Dashboard: Security Posture Insights.
In Dashboards > Feature Adoption, you can view the security features that you are using in
your deployment. This helps you make sure that you are getting the most out of your Palo Alto
Networks security subscriptions and firewall features.
This dashboard shows where your security policy is strong and where there are gaps in capability
adoption that you can focus on improving. To gain maximum visibility into traffic and maximum
protection against attacks, set goals for security capability adoption and use the following
recommendations as a best practice baseline. Assess your current posture against the baseline to
identify gaps in security policy capability adoption.
Adoption Summary helps identify devices, zones, and areas where you can improve security policy
capability adoption. You can review adoption information by Device Group, Serial Number & Vsys,
Zones, Areas of Architecture, Tags, Rule Details, and Zone Mappings. Filter on Device Group to
narrow the scope and identify gaps.
In Feature Adoption, you can also view whether your security features are configured according
to Palo Alto Networks best practices by selecting Best Practices.
.
To focus on best practice compliance for a specific set of firewalls, you can filter the chart
based on device group.
Select the section for a feature on the chart to view which policy rules can be improved.
Select a rule to view its details without needing to leave the app.
In Dashboard > Posture > CDSS Adoption, you can view the recommended Cloud-Delivered
Security Services (CDSS) subscriptions and their usage in your devices. This helps you to identify
security gaps and harden the security posture of your enterprise. After you navigate to this page,
you will see a pop-up asking you to confirm or update your zone roles in NGFWs to get accurate
security services recommendations. You can follow the link in this pop-up window to map zones
to roles.
Currently, this dashboard only supports four security subscriptions: Advanced Threat
Prevention, Advanced URL Filtering, DNS Security and Wildfire.
1. At the top of the CDSS Adoption page, you can view the number of total known NGFWs and
number of NGFWs sending telemetry in your instance.
2. The adoption of CDSS involves progressing through activation, configuration, and adherence
to best practices. To track progress for each subscription, simply click on the numbers in the
graph to view a list of devices that require updates along this journey. In this case, let us check
the NGFWs where DNS security is not configured.
3. Check NGFWs on which DNS Security configuration is recommended but not configured. View
details to check source role and destination role.
4. View Policies to view the details of the rules and corresponding source and destination zones.
Further, you can click a rule name to view its details.
5. Navigate back to the funnel graph. You can view the same information in the pie chart format
as well.
6. When you do not need a recommended security service for any reason, you can override it. In
this case, we don't need the DNS security service. Click the cancel icon next to DNS.
8. Click Override.
This concludes how to view the recommended CDSS subscriptions and their usage in your
devices.
For more information, see Dashboard: CDSS Adoption.
Assess Vulnerabilities
Where Can I Use This? What Do I Need?
Strata Cloud Manager shows you which vulnerabilities affect a given firewall and PAN-OS version
to help you decide whether you should upgrade. Navigate to Incidents & Alerts > NGFW > All
Alerts and select the PAN-OS Known Vulnerability alert to see the latest security advisories
impacting the firewall that raised the alert.
Select Vulnerabilities in this PAN-OS version to view the affected feature for a vulnerability in
the Feature Affected column. This helps you to decide whether to upgrade a firewall based on the
vulnerability and its impact on your enabled feature. If a CVE is not associated with a feature, then
the value under Feature Affected is blank. This type of CVE affects the firewall with the specified
model or version.
By default, the PAN-OS Known Vulnerability alert shows all of the vulnerabilities in the PAN-
OS version on the device. However, if you enabled Product Usage telemetry on the firewall, you
can choose to view only the vulnerabilities that affect the particular firewall based on its enabled
features. That way, you can better understand which vulnerabilities are a concern for the firewall
and make a more informed decision about whether to upgrade.
You can also use the PAN-OS CVEs dashboard that shows you the number of devices impacted
by a specific vulnerability based on the features that have been enabled on devices. Strata Cloud
Manager analyzes the features that have been enabled to determine the devices impacted by the
CVE. The following task shows how to assess vulnerabilities that impact devices and generate
upgrade recommendation to fix the vulnerabilities.
This task shows how to assess vulnerabilities that impact devices and generate upgrade
recommendation to fix the vulnerabilities.
STEP 1 | From Strata Cloud Manager, navigate to Dashboards > PAN-OS CVEs.
STEP 3 | Select devices that you want to upgrade to fix the vulnerabilities.
STEP 6 | Select one of the upgrade options to view details about New Features, PAN-OS Known
Vulnerabilities, Changes of Behavior, and PAN-OS Known Issues
You can Export the details in a CSV file and download it.
To get to the Compliance Summary Dashboard, go to Dashboards, and then select the
Compliance Summary tab. You can view a history of changes to the security checks made up to
12 months in the past, grouped together by the Center for Internet Security (CIS) and the National
Institute of Standards and Technology (NIST) frameworks. For each framework, you’ll see a list
of controls as well as the percentage of current and average compliance rate, total number of
best practice checks, and the number of failed checks for each control. Interact with the chart
and the list to see the relationship between controls and their historical statistics. View details
of individual controls and their associated checks, and select a best practice check to view the
firewall configuration that is failing the check.The CIS Critical Security Controls framework is a
prioritized set of recommended actions and best practices that help protect organizations and
their data from known cyber attack vectors.
You can view check summaries for 11 of the 16 basic and foundational CIS controls:
• CSC 3: Continuous Vulnerability Management
• CSC 4: Controlled Use of Administrative Privileges
• CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
• CSC 7: Email and Web Browser Protections
• CSC 8: Malware Defenses
• CSC 9: Limitation and Control of Network Ports, Protocols, and Services
• CSC 11: Secure configuration for Network Devices, such as Firewalls, Routers, and Switches
• CSC 12: Boundary Defense
• CSC 13: Data Protection
You can customize security posture checks for your deployment to maximize relevant
recommendations using the features below.
• Security Checks
List of the best practice checks that AIOps for NGFW uses to evaluate your configuration.
The configuration of firewalls and Panorama is compared to Palo Alto Networks best practice
checks to assess the security posture of your devices and to generate security alerts. You can
see a list of the best practice checks that are used to evaluate your configuration.
Here, you can:
1. Set the severity level for checks to identify the checks that are the most critical to your
deployment.
2. Temporarily disable checks.
If you choose to disable a check, you can specify how long it will remain disabled and leave a
comment explaining the reason for disabling it.
3. Set the response when a check fails.
• Zone to Role Mapping
Map the zones in NGFWs to roles to get customized recommendations.
• Role to Security Service Mapping
Manage the security services needed for traffic between zones and roles in all NGFWs.
The Panorama CloudConnector Plugin enables you to take proactive measures against suboptimal
configurations by blocking commits that do not pass particular best practice checks. When you
indicate in AIOps for NGFW that you want a check to Fail Commit, Panorama automatically
blocks commits of any configuration that does not pass that check. Rather than wait to receive
an alert about a failed best practice check, use the plugin to keep configuration issues out of your
deployment in the first place.
STEP 1 | Ensure that you meet all prerequisites, and install the plugin.
STEP 2 | Specify the best practice checks that will block commits on failure.
1. Select Manage > Security Posture > Settings.
2. Find the check that you want to block commits.
3. Set Action on Fail to Fail Commit
STEP 3 | Verify by attempting to commit a configuration that does not pass the check.
1. Log in to Panorama.
2. Violate the best practice check that you specified to Fail Commit.
You should see a dialog stating that the validation failed because the configuration did not pass
the best practice check.
Setting a check to Fail Commit causes the check to fail both validation and the actual
commit operation.
Policy Analyzer
Where Can I Use This? What Do I Need?
Updates to your Security policy are often time-sensitive and require you to act quickly. However,
you want to ensure that any update you make to your Security policy meets your requirements
and does not introduce errors or misconfigurations (such as changes that result in duplicate or
conflicting rules).
The Policy Analyzer feature in Strata Cloud Manager enables you to optimize time and resources
when implementing a change request. Policy Analyzer not only analyzes and provides suggestions
for possible consolidation or removal of specific rules to meet your intent but also checks for
anomalies, such as Shadows, Redundancies, Generalizations, Correlations, and Consolidations in
your rulebase.
Use Policy Analyzer to add or optimize your Security policy:
• Before adding a new Security policy—Check to see if new rules need to be added. Policy
Analyzer recommends how best to change your existing Security policy to meet your
requirements without adding another rule, if possible.
• Streamline and optimize your existing Security policy rules—See where you can update your
rules to minimize bloat and eliminate conflicts and also to ensure that traffic enforcement
aligns with the intent of your Security policy.
Analyze your Security policy rules both before and after you commit your changes.
• Pre-Change Policy Analysis—Enables you to evaluate the impact of a new rule and analyze the
intent of the new rules against the rules that already exist to recommend how to best meet the
intent.
• Post-Change Policy Analysis—Enables you to clean the existing rulebase by identifying
Shadows, Redundancies, and other anomalies that have accumulated over time.
Policy Analyzer supports both NGFW and Prisma Access deployments, managed by
Panorama or Strata Cloud Manager.
Policy Analyzer for Panorama managed deployments requires the following:
• CloudConnector Plugin 1.1.0 or later on your Panorama appliance. You need to
enable this plugin using the command:
The Security policy rule Pre-Change analysis performs the new intent satisfaction analysis:
• New Intent Satisfaction Analysis—Checks whether the intent of a new Security policy rule is
already covered by an existing rule.
Before you begin:
1. Go to Manage > Security Posture > Policy Analyzer > Pre-change Policy Analysis.
2. At the top of the Policy Analyzer page, select Cloud Manager for Strata Cloud Manager
managed deployments or select a Panorama instance for Panorama managed deployments
containing the policy rules that you need to analyze.
On a Panorama appliance, device groups are hierarchical. There are four levels of device
groups that you can create and you assign NGFWs to the device group at the lowest level of
the hierarchy. The policy that you create at a higher level is then inherited by all the device
groups under it. You can run the analysis for up to 10 device groups with NGFWs directly
assigned to them, which allows you to analyze all the policy rules that are pushed to that set of
directly assigned NGFWs.
For Strata Cloud Manager managed deployments, folders are hierarchical. The leaf folder or
the final folder containing the devices are shown.
STEP 3 | Specify the type of analysis by selecting one or more analysis types:
• New Intent Satisfaction Analysis
Add New Security Rule Intent for analysis.
Specify information about the new security rule, and AIOps for NGFW can check if existing
rules cover the intent.
Enter the values for the components of a security policy rule. The default value for the fields
related to a security rule is “Any.”
Save the settings.
Review the summary of the new security rule intent.
You can create up to 10 new security rules, or you can copy a rule and edit it.
STEP 4 | Submit Analysis Request or Save As Draft to edit the rule later.
View the status of an analysis on the Policy Analyzer page under Analysis Requests.
You can cancel a rule whose status is in-progress and it will be shown as Canceled.
After the analysis is complete, view the analysis report.
Select an analysis report whose status is completed to view the results of the policy analysis. You
can view the results of the analysis.
Intent Satisfaction Results
From the list of analyses under Analysis Requests, click an analysis to view its analysis results.
These results include:
1. Summary of the analysis with details about device groups and the anomaly count.
2. Click the name of a device group to view the result of the intent satisfaction analysis:
• Intent Fully Met—Your security rule is a duplicate of one of the existing rules in the device
group.
• Intent Partially Met—Your security rule is partially meeting the intent of one of the existing
rules in the device group.
• Intent not met—Your security rule is a unique rule that is not present in the device group.
You can add this rule to the device group.
3. View the results of the analysis for the new security rule intent.
In this example, there are two rules. The intent of the first rule matches fully with existing rules
and the intent of the second rule matches partially with the existing rules.
4. View the details of the new security rule and check the intent satisfaction results.
In this example, all the attributes of the new rule intent rule 1 matches the attributes of the
existing rule Shared Rule 1. The intent of the new rule fully matches the intent of the existing
rule. Therefore, you need not add this new rule to the configuration.
Strata Cloud Manager analyzes device configurations as soon as you push them, detecting
anomalies. It also performs an analysis every 4 hours. For Panorama managed configurations,
Strata Cloud Manager performs the analysis when you commit the configuration on Panorama.
Policy Analyzer analyzes this configuration for Shadows, Redundancies and other anomalies, and
the results are available for review in Manage > Security Posture > Policy Analyzer > Post-change
Policy Analysis.
You can view the following information:
1. Shows the summary of the analysis across all the policy sets, that is, all the device groups with
NGFWs directly assigned to them. You can view the anomalies or the anomalies based on high
priority. The values in this report show the unique number of anomalies found in all the device
groups. The colors in the chart indicate the different types of anomalies.
6. View the attributes of a selected rule and the details of the anomaly.
This image shows an example of the redundancy anomaly. In this example, the BND rule is
already covered by another BND Users rule. Therefore, you can remove the BND rule.
7. View the suggested next steps to remediate an anomaly.
67
NGFW Health and Software Management
The Device Health dashboard shows you the cumulative health status and performance of
your deployment based on the health scores of the onboarded NGFWs. The device health is
determined by the severity of the health score (0-100) and its corresponding health grade (good,
fair, poor, critical). The health score is calculated based on the priority, quantity, type, and status
of the open alerts.
Here is an example how you can optimize device performance using the Device Health
dashboard.
As a network administrator for a large enterprise, you've been tasked with improving the overall
health and performance of your firewalls. Your goal is to proactively identify and address potential
issues before they impact network operations.
By following the below task-based approach, you'll leverage the Strata Cloud Manager's Device
Health features to maintain a high-performing and reliable network infrastructure, minimizing
downtime and enhancing overall security posture.
1. Access the Device Health dashboard in Strata Cloud Manager to get an overview of the health
status of your firewalls.
2. Review the Health Score for each firewall, focusing on devices with scores below 80, which
indicate potential issues.
3. Analyze the Device Health Statistics to identify specific areas of concern, such as high CPU
usage, memory utilization, or session count.
4. Examine the Device Health Score Trend over the past 30 days to spot any recurring patterns or
gradual declines in performance.
5. For firewalls with consistently low health scores or declining trends, drill down into the detailed
metrics to pinpoint the root causes.
6. Develop and implement a remediation plan for the affected devices, which may include:
• Optimizing security policies
• Upgrading hardware for overutilized devices
• Adjusting network configurations to balance traffic load
After implementing changes, continue monitoring the Device Health dashboard to verify
improvements and ensure sustained optimal performance.
For more information, see Dashboard: Device Health.
Select Workflows > Software Upgrades > Upgrade Recommendations to use Strata Cloud
Manager to analyze the features that are enabled on your firewalls and create a customized
recommendation that provides specific information for your network:
• The best software version to run on your devices.
• Information about new features, changes to behavior, vulnerabilities, and software issues in
each recommended software version.
Types of upgrade recommendations:
• System-generated recommendations that are generated from device telemetry data twice each
week.
• User-generated custom recommendations that are generated when you select devices for
specific PAN-OS CVEs.
• User-generated recommendations that you generate by uploading a tech support file (TSF) of a
firewall.
• You can upload a TSF of only one device at a time and the TSF must be in the .tgz
format.
• You can generate a software upgrade recommendations only from a TSF that you
generate for and upload from a firewall running the PAN-OS 9.1 or a later PAN-OS
version.
• or
From Strata Cloud Manager, navigate to Monitor > Capacity Analyzer to analyze and monitor
your devices' resource capacity by keeping track of their metrics usage based on their model
types. You can analyze metrics using the following methods:
• Analyze Metric Capacity based on Metric, Model, and Device
• Analyze Metric Capacity Based on Based on Device Models
• Analyze Metric Capacity Based on Metrics
Capacity Analyzer is enhanced to support alerts that help you to anticipate resource consumption
nearing its maximum capacity and raise alerts. See Manage Capacity Analyzer Alerts.
The Capacity Analyzer feature is not supported for the VM Series firewalls.
2. Click a cell corresponding to the device model and the metric to check the capacity usage. In
this example, we are clicking the ARP table size for the PA-220 device model.
• Select one of the host names to view the metric capacity trend.
• Alerts raised for the metric and predicted date when the metric will reach its maximum
capacity.
• Predicted trend for the metric. Strata Cloud Manager forecasts the date when the metric
will hit the maximum capacity. You can hover your cursor over the graph to check the
metric capacity at any specific point of time.
Each row displays a metric's utilized capacity, indicating the number of resources used for that
metric in a device. Additionally, you can view the alerts raised for the metric and predicted date
when the metric will reach its maximum capacity.
2. In the Capacity Analyzer table, select a metric to view its trend on a device.
Under Alert Name, you can view the alerts raised for the address objects metric corresponding
to a host name.
You can also select a metric type and drill down to a metric to view its capacity in all
the devices in a tabular format. For example, Configuration Resource type metric >
Objects > Address Objects.
Each row displays the ARP table size metric’s used and unused capacity for every host under
device models. Additionally, you can view the alerts raised for this metric for every host and
the predicted date when the metric will reach its maximum capacity.
2. Select a host name to view the graphical trend of the selected metric.
You can select the Prediction Time to check the predicted trend for the metric. Strata Cloud
Manager forecasts the date when the metric will hit the maximum capacity.
You can hover your cursor over the graph to check the metric capacity at any specific point of
time.
AIOps for NGFW helps you tighten security posture by aligning with best practices. You can
leverage AIOps for NGFW to assess your Panorama, NGFW, and Panorama-managed Prisma
Access security configurations against best practices and remediate failed best practice checks.
AIOps for NGFW streamlines the process of checking InfoSec compliance on your network
infrastructure.
AIOps for NGFW is free, and the following AIOps Best Practice Assessment (BPA) capabilities are
available without an AIOps premium license. For the full list of available Best Practice features,
see Built-In Best Practices:
• Check the Best Practices Dashboard for daily best practices reports, and their mapping to
Center for Internet Security’s Critical Security Controls (CSC) checks, to help you identify
85
Best Practices for NGFWs
areas where you can make changes to improve your best practices compliance. Share the best
practice report as a PDF and schedule it to be regularly delivered to your inbox.
• Monitor Feature Adoption and stay abreast of which security features you’re using in your
deployment and potential gaps in coverage.
• Get Security Posture Alerts from AIOps for NGFW to know when your security settings may
need a closer look.
Command Line Interface (CLI) remediations are also available in AIOps for NGFW under Alerts
> Security > Alert Details. View recommendations intended to help you to remediate the
issues triggering an alert.
Security alerts and CLI remediations are available only for devices sharing telemetry.
This feature doesn’t support Tech Support File (TSF) manual upload for PAN-OS
devices running versions 9.1 and above.
• Generate BPA reports for (non-telemetry) PAN-OS devices running versions 9.1 and above,
now including feature adoption metrics. If you’ve been using the BPA standalone tool to
generate BPA reports, you might be wondering “Can I Still Generate BPA Reports from the
Customer Support Portal?” We’ve got you covered as well.
With a premium license, AIOps for NGFW also offers advanced security posture capabilities.
Premium features focus on ensuring full utilization and maximal security from your firewalls.
Check out what both free and premium licenses have to offer.
You can now run the Best Practice Assessment (BPA) and Feature Adoption summary directly
from Strata Cloud Manager. Just upload a Tech Support File (TSF). You can generate the on-
demand BPA report for devices that are not sending telemetry data or onboarded to AIOps for
NGFW.
The BPA evaluates your security posture against Palo Alto Networks best practices and prioritizes
improvements for devices. Security best practices prevent known and unknown threats,
reduce the attack surface, and provide visibility into traffic, so you can know and control which
applications, users, and content are on your network. Additionally, best practices include checks
for the Center for Internet Security’s Critical Security Controls (CSC). See the best practices
guidance to bolster security posture and implement improvements.
The best practices dashboard, security alerts, and adoption summary features are not
available for devices onboarded without Strata Logging Service or telemetry enabled.
STEP 2 | Log in to your activated instance AIOps for NGFW. You’ll see the following tabs, even
without Strata Logging Service:
• Posture
• Activity
• Settings
The upload time is dependent on the size of your .tgz file and your Internet speed. Uploading
the file could take a few minutes for larger files. Expand In-Progress to view the status of the
TSF files.
• On-demand BPA supports only the Tech Support Files (TSF) in the .tgz file format.
• On-demand BPA supports TSFs from devices with the PAN-OS version 9.1 or above
for report generation.
STEP 6 | Select View Report below Completed after the TSF is processed to view the generated BPA
report from your device.
Best Practices
Where Can I Use This? What Do I Need?
• or
• license
Enable telemetry sharing on devices
The dashboard shows aggregated data per Prisma Access and NGFW/Panorama
associated with your tenant.
Navigate to Strata Cloud Manager > Dashboards > More Dashboards > Best Practices dashboard
to measure your security posture against Palo Alto Networks’ best practice guidance. Importantly,
the best practices assessment includes checks for the Center for Internet Security’s Critical
Security Controls (CSC). CSC checks are called out separately from other best practice checks, so
you can easily pick out and prioritize updates that will bring you up to CSC compliance.
How can you use the data from the dashboard?
While best practice guidance aims to help you bolster your security posture, findings in this report
can also help you to identify areas where you can make changes to more effectively manage your
environment.
your policy rules. CLI remediations are generated using TSF data you upload when generating
an On-Demand BPA Report.
• Rulebases
Looks at how your policy is organized, and whether configuration settings that apply across
many rules align with best practices (including CSC checks).
• Rules
Shows you the rules failing best practice and CSC checks. See where you can take quick
action to fix failed checks. Rules are sorted based on session count, so you can start by
reviewing and updating the rules that are impacting the most traffic.
• Profiles
Shows you how your profiles stack up against best practices, including CSC checks. Profiles
perform advanced inspection for traffic matched to a security or decryption rule.
• Identity
Shows whether the authentication enforcement settings (authentication rule, authentication
profile, and authentication portal) for a device meet the best practices and comply with CSC
checks.
• Network
Checks whether the application override rules and network settings align with best practice
and CSC checks.
• Service Setup
See how the subscriptions you have enabled on your devices are aligning with the best practice
and CSC checks. You can review the WildFire setup, GlobalProtect portal and GlobalProtect
gateway configurations here and fix the failed checks.