Strata Cloud Manager Getting Started
Strata Cloud Manager Getting Started
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2023-2025 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
March 17, 2025
Strata Cloud Manager Getting Started 2 ©2025 Palo Alto Networks, Inc.
Table of Contents
Introducing Strata Cloud Manager.............................................................. 13
How Strata Cloud Manager Strengthens Security............................................................ 15
How Strata Cloud Manager Predicts and Prevents Network Disruptions...................16
How Strata Cloud Manager Works Everywhere Consistently....................................... 17
Strata Cloud Manager Support...............................................................................................18
License Support..............................................................................................................18
Language Support.......................................................................................................... 21
First Look at Strata Cloud Manager......................................................................................23
Launch Strata Cloud Manager................................................................................................ 32
Launch Strata Cloud Manager for the First Time...................................................32
Moving to Strata Cloud Manager from a Dedicated Product App.....................33
Get Started with Strata Cloud Manager.............................................................................. 36
Shared Management for Prisma Access and NGFWs...........................................39
Built-In Best Practices in Strata Cloud Manager............................................................... 42
Strata Copilot.................................................................................................... 49
Strata Copilot Availability........................................................................................................50
Regional Access..............................................................................................................50
Availability by Product................................................................................................. 51
Data and Content Sources.......................................................................................... 52
Get Started with Strata Copilot.............................................................................................54
Launch Strata Copilot................................................................................................... 54
First Look......................................................................................................................... 55
Response Types............................................................................................................. 56
Strata Copilot Prompts............................................................................................................ 68
Tips for Improving Prompts........................................................................................ 68
Prompt Examples........................................................................................................... 69
Get Help with Strata Copilot................................................................................................. 77
Share Feedback About a Response...........................................................................77
Get Remediation Guidance or Open a Support Case........................................... 77
AI Canvas........................................................................................................... 81
Core Components..................................................................................................................... 82
Data Sources.............................................................................................................................. 83
Create an AI Canvas.................................................................................................................84
Manage Widgets........................................................................................................................87
Create a Widget from a Query.................................................................................. 87
View, Edit, and Export Widgets................................................................................. 89
Delete an Unused Widget...........................................................................................92
Strata Cloud Manager Getting Started 3 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 4 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 5 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 6 ©2025 Palo Alto Networks, Inc.
Table of Contents
How can you use the data from the dashboard?................................................ 227
Security Posture Insights Dashboard: Device Security Posture.......................228
Security Posture Insights Dashboard: Security Posture Statistics................... 229
Security Posture Insights Dashboard: Score Trend.............................................230
Dashboard: NGFW SD-WAN.............................................................................................. 231
What does this dashboard show you?...................................................................232
How can you use the data from the dashboard?................................................ 232
NGFW SD-WAN Dashboard: Application Health............................................... 232
NGFW SD-WAN Dashboard: Top Impacted Applications................................ 233
NGFW SD-WAN Dashboard: Impacted Applications........................................ 238
NGFW SD-WAN Dashboard: Link Health............................................................ 238
NGFW SD-WAN Dashboard: Top Worst Links...................................................239
NGFW SD-WAN Dashboard: Poor Links..............................................................241
NGFW SD-WAN Dashboard: Health By Cluster and Sites...............................242
Dashboard: Prisma SD-WAN...............................................................................................243
What does this dashboard show you?...................................................................243
Prisma SD-WAN Dashboard: Device to Controller Connectivity....................243
Prisma SD-WAN Dashboard: Applications........................................................... 244
Prisma SD-WAN Dashboard: Top Alerts by Priority.......................................... 245
Prisma SD-WAN Dashboard: Overall Link Quality............................................. 246
Prisma SD-WAN Dashboard: Bandwidth Utilization.......................................... 247
Prisma SD-WAN Dashboard: Transaction Stats.................................................. 248
Prisma SD-WAN Dashboard: Predictive Analytics..............................................249
Dashboard: PAN-OS CVEs................................................................................................... 251
What does this dashboard show you?...................................................................251
How can you use the data from the dashboard?................................................ 252
Dashboard: CDSS Adoption................................................................................................. 253
What does this dashboard show you?...................................................................254
How can you use the data from the dashboard?................................................ 254
Override Recommended Security Service.............................................................258
Dashboard: Feature Adoption............................................................................................. 266
What does this dashboard show you?...................................................................266
How to use this dashboard...................................................................................... 267
Identify gaps in adoption...........................................................................................269
Dashboard: On Demand BPA..............................................................................................272
What does this dashboard show you?...................................................................272
How can you use the data from the dashboard?................................................ 272
Generate On-Demand BPA Report........................................................................ 273
Dashboard: SASE Health.......................................................................................................275
What does this dashboard show you?...................................................................275
How can you use the data from dashboard?....................................................... 275
Strata Cloud Manager Getting Started 7 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 8 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 9 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 10 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 11 ©2025 Palo Alto Networks, Inc.
Table of Contents
Strata Cloud Manager Getting Started 12 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Where Can I Use This? What Do I Need?
• , including those funded by Software Each of these licenses include access to Strata
NGFW Credits Cloud Manager:
• Prisma Access
•
Palo Alto Networks Strata Cloud Manager empowers you with AI-powered, unified management
and operations for your entire network security deployment. With Strata Cloud Manager you can
easily manage your entire Palo Alto Networks Network Security infrastructure – your NGFWs and
SASE environment – from a single, streamlined user interface. Gain comprehensive visibility into
users, branch sites, applications, and threats across all network security enforcement points; this
gives you actionable insights, better security, and easy troubleshooting and problem resolution.
Predict and Prevent Network Disruptions
Strata Cloud Manager predicts and prevents network disruptions and quickly remediates
issues, so that you and your users can continue day-to-day business and stay productive.
Strengthen Security with Real-Time Best Practices
Strata Cloud Manager identifies vital and underused security capabilities, and guides you to
enable them based on the best practices that align with your needs. Strengthen your security
posture with built-in best practices, and inline remediation features powered by AIOps.
Simple and Consistent Network Security Management and Operations
Strata Cloud Manager consolidates your security tools for improved operation and insights, so
that you can adopt a simple and consistent management experience for your entire network
security stack.
13
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 14 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 15 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 16 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 17 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• , including those funded by Software Each of these licenses include access to Strata
NGFW Credits Cloud Manager:
• Prisma Access
•
Strata Cloud Manager provides AI-powered, unified management and operations for your NGFWs
and SASE network; the Strata Cloud Manager features available to you depend on your licenses.
Here's more on the licenses support Strata Cloud Manager, and also Strata Cloud Manager
language support.
License Support
These licenses enable Strata Cloud Manager to manage NGFWs, SASE, and security services,
and also unlock Strata Cloud Manager network security features. → Here's how to validate your
licenses
Strata Cloud Manager Strata Cloud Manager Essentials provides management and
Essentials security features, and these features are available to you free
with:
• Next-Generation Firewalls (NGFW)
• Prisma Access
Strata Logging Service is available as an optional add-on for
Strata Cloud Manager Essentials.
Strata Cloud Manager Getting Started 18 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Pro Strata Cloud Manager Pro is the paid tier that includes
all the features of Strata Cloud Manager Essentials, plus
advanced features to enhance operational health, prevent
network disruptions, strengthen real-time security posture,
and Autonomous Digital Experience Management (ADEM)
for monitoring user experience performance. Strata Cloud
Manager Pro includes Strata Logging Service with one year
of log retention and unlimited storage, enabling centralized
logging and seamless data retrieval across your deployment.
You can purchase Strata Cloud Manager Pro for the following
products:
• Next-Generation Firewalls (NGFW)
• VM Series funded by Software NGFW Credits
• Prisma Access
• Cloud NGFW for AWS and Azure (funded by PAYG or the
credit pricing model)
AIOps for NGFW Premium For NGFWs with an AIOps for NGFW Premium license,
Strata Cloud Manager gives you an overall view of the health
and security of your NGFWs, and can enforce proactive checks
to close security gaps.
• NGFW (Managed by PAN-OS or Panorama) → For PAN-OS
and Panorama Managed NGFWs with an AIOps for NGFW
Premium license, use Strata Cloud Manager to oversee your
deployment health and security posture.
• NGFW (Managed by Strata Cloud Manager) →
With an AIOps for NGFW license, you can also use
Strata Cloud Manager for cloud management for NGFWs.
Strata Cloud Manager Getting Started 19 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Software NGFW Credits For VM-Series funded with Software NGFW Credits, Strata
Cloud Manager supports AIOps for NGFW Premium features,
including cloud management for NGFWs.
Prisma Access There's two ways you can manage Prisma Access: you can use
Strata Cloud Manager or Panorama. Strata Cloud Manager
provides Prisma Access visibility features, and these are
supported regardless of the management interface you're
using. This means that if you're using Panorama to manage
Prisma Access, you can still use Strata Cloud Manager for
comprehensive monitoring of Prisma Access environment.
Prisma Access (Managed by Strata Cloud Manager)
Strata Cloud Manager Getting Started 20 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Prisma SD-WAN Use Strata Cloud Manager for Prisma SD-WAN. Prisma SD-
WAN is a cloud-delivered service that implements app-defined,
autonomous SD-WAN to help you secure and connect your
branch offices, data centers and large campus sites without
increasing cost and complexity. The AppFabric connects your
sites securely with application awareness and gives you the
freedom to use any WAN, any cloud for a thin branch (security
from the cloud) solution.
Cloud-Delivered Security If you have either a Prisma Access or AIOps for NGFW
Services (CDSS): Premium license, you can use Strata Cloud Manager to manage
and monitor your security subscriptions. Strata Cloud Manager
• Advanced Threat
delivers the protections your security subscriptions provide
Prevention
consistently across your enterprise traffic.
• Advanced URL Filtering
The Strata Cloud Manager features available to you for security
• Advanced WildFire subscriptions do depend on your license, and can include:
• DNS Security • Strata Cloud Manager dashboards and reports for security
• Enterprise DLP subscriptions
• IoT Security • Strata Cloud Manager unified management for security
• SaaS Security subscriptions. If you're using Strata Cloud Manager to
enforce a shared security policy across NGFWs and/
or Prisma Access, you can use a single, centralized
configuration for your security subscriptions.
Language Support
The Strata Cloud Manager web interface supports localization. In addition to English, these are
the languages that Strata Cloud Manager supports:
• Chinese Simplified (zh-cn)
• Chinese Traditional (zh-tw)
Strata Cloud Manager Getting Started 21 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Spanish (es-es)
• Japanese (ja-jp)
• French (fr-fr)
• German (de-de)
Strata Cloud Manager Getting Started 22 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• , including those funded by Software Each of these licenses include access to Strata
NGFW Credits Cloud Manager:
• Prisma Access
•
Here's a first look at Strata Cloud Manager. The Strata Cloud Manager user interface provides a
comprehensive view of your network, and gives you with a unified workflow to manage NGFWs
and SASE. Move through the new simplified and consistent navigation to interact with all your
network data, get actionable insights that are surfaced for you automatically, and collectively
manage and monitor Prisma Access, your NGFWs, and your cloud-delivered security services.
Explore each menu on the left navigation bar – these paths are standard across any Palo Alto
Networks products or subscriptions you're using with Strata Cloud Manager. This makes it easy
to:
• adopt new features and subscriptions
• onboard new users, devices, sites, or locations
as they will slot right into your existing management setup.
Important
The features available to you in Strata Cloud Manager depend on your subscriptions.
You can review the Strata Cloud Manager docs to see any license requirements for
Strata Cloud Manager features.
Strata Cloud Manager Getting Started 23 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 24 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 25 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 26 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 27 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 28 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 29 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 30 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 31 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• , including those funded by Software Each of these licenses include access to Strata
NGFW Credits Cloud Manager:
• Prisma Access
•
The Strata Cloud Manager app is available on the Palo Alto Networks hub, and you can access it
directly at stratacloudmanager.paloaltonetworks.com.
A Prisma Access license, AIOps for NGFW Premium license, or a Prisma SD-WAN license is a
basic requirement for Strata Cloud Manager unified management and operations. If you have at
least one of these licenses, you can access Strata Cloud Manager to gain visibility into or manage
your products.
If you have more than one of these licenses, Strata Cloud Manager gives you a single interface
to interact with these products, along with additional licenses or add-on subscriptions (like your
Palo Alto Networks security subscriptions). → See the products and licenses that are supported
for Strata Cloud Manager unified management and operations
To launch or access Strata Cloud Manager:
• If you are new to Prisma Access, AIOps for NGFW Premium, or Prisma SD-WAN in October
2023 or later, here's how to Launch Strata Cloud Manager for the First Time
• If you were previously using separate, standalone apps on the hub to manage your products,
here's more on Moving to Strata Cloud Manager from a Dedicated Product App
Strata Cloud Manager Getting Started 32 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Launch the app and take a First Look at Strata Cloud Manager. Continue to onboard your product:
• Get started with AIOps for NGFW Premium, including Cloud Management for NGFWs
• Get started with Prisma Access
• Get started with Prisma SD-WAN
What to expect when moving to Strata Cloud Manager from a dedicated product app:
Strata Cloud Manager provides unified management and operations based on license support –
here are the products that you can monitor or manage with Strata Cloud Manager.
In-product notifications will let you know in advance that an update is coming soon to give you
Strata Cloud Manager.
The update is seamless and does not impact your data, alerts, or assets.
Strata Cloud Manager Getting Started 33 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
After the update takes place, you will log into the Strata Cloud Manager app on the hub; you
will no longer use separate apps on the hub for Prisma Access, AIOps for NGFW Premium, or
Prisma SD-WAN.
Strata Cloud Manager Getting Started 34 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
If you were previously using more than one product app that is updating for Strata
Cloud Manager, the updated product apps will all redirect to the same Strata Cloud
Manager instance.
Strata Cloud Manager provides a navigation that's common across your Network Security
products. Take a first look at Strata Cloud Manager and explore the new navigation experience
and features.
Find your product features in the new, unified management interface:
• AIOps for NGFW: Where are my features in Strata Cloud Manager?
• Prisma SD-WAN: Where are my features in Strata Cloud Manager?
• Prisma Access Insights: Where are my features in Strata Cloud Manager?
• Prisma Access: Where are my features in Strata Cloud manager?
Strata Cloud Manager Getting Started 35 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• , including those funded by Software Each of these licenses include access to Strata
NGFW Credits Cloud Manager:
• Prisma Access
•
Strata Cloud Manager gives you AI-powered, unified management and operations for your
NGFWs and SASE network. Here's a cheatsheet on getting started with Strata Cloud Manager for
the first time.
If you're planning to use Strata Cloud Manager to onboard and manage Prisma Access, NGFWs
(requires AIOps for NGFW Premium), or both together, this includes what you need to know to
get started with Shared Management for Prisma Access and NGFWs
(In the hub) Activate Your Licenses
After purchasing a license, you'll receive an email with an activation link. The link launches
a guided workflow in the hub; follow the activation workflow for each license you'd like to
activate:
• AIOps for NGFW Premium license
• Activate a Prisma Access license
• Prisma SD-WAN
Activating any one of these licenses enables Strata Cloud Manager. After you have activated at
least one of these licenses, continue to activate any additional licenses or add-on subscriptions.
Launch Strata Cloud Manager
After you activate a Prisma Access, AIOps for NGFW Premium, or Prisma SD-WAN license, the
Strata Cloud Manager app will be available to you on the Palo Alto Networks hub, or you can
access it directly at stratacloudmanager.paloaltonetworks.com.
Strata Cloud Manager Getting Started 36 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Go to Manage > Configuration > NGFW and Prisma Access to check your Prisma Access
license status and details, and see what other details might be available.
It might be that you do not see much data here just yet if you've not yet onboarded
NGFWs or if your Prisma Access environment is still provisioning. If that's the case,
check back after you've completed the rest of the steps here.
Strata Cloud Manager Getting Started 37 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 38 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 39 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
broader or more granular configuration. The configuration scope enables you to apply policy
globally, or provide targeted enforcement to certain NGFWs or Prisma Access deployments.
Here's more on how to get started with organizing your Strata Cloud Manager configuration:
• Workflows: Folder ManagementSystem Settings: Folder Management
Use folders to logically group NGFWs for simplified configuration management. The Prisma
Access folders are predefined based on deployment type. You can also enable Web Security
(a simplified management experience for admins managing access to the internet and SaaS
applications) at the folder level.
• Manage: Snippets
Use snippets to group configurations that you can quickly push to your NGFWs or Prisma
Access deployments.
• Manage: Variables
Use variables your configurations to accommodate device or deployment-specific
configuration objects.
Shared Security Policy for NGFWs and Prisma Access
Strata Cloud Manager gives you unified management for Prisma Access and your NGFWs.
Your Strata Cloud Manager security policy is shared, and you can apply it globally across
Strata Cloud Manager Getting Started 40 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Prisma Access and NGFWs, or target specific settings to Prisma Access deployments or
specific groups of firewalls.
Go to Manage > Configuration > NGFW and Prisma Access to get started.
You'll be prompted to set the scope of the configuration push, based on your folders. Here's
more on how to:
• Push your configuration changes
• Review the status of a configuration push
• See how you can clean up your configuration
Strata Cloud Manager Getting Started 41 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• , including those funded by Software Each of these licenses include access to Strata
NGFW Credits Cloud Manager:
• Prisma Access
•
Palo Alto Networks best practices are designed to help you get the most secure network possible
by streamlining the process of checking compliance on your network infrastructure. We’ve built
best practice checks directly in to Strata Cloud Manager, so that you can get a live evaluation of
your configuration. Tighten your security posture by aligning with best practices. You can leverage
Strata Cloud Manager to assess your Panorama, NGFW, and Panorama Managed Prisma Access
security configurations against best practices and remediate failed best practice checks.
Best practice guidance aims to help you bolster your security posture, but also to help you
manage your environment efficiently and to best enable user productivity. Continually assess
your configuration against these inline checks—and when you see an opportunity to improve your
security, take action then and there.
Strata Cloud Manager Getting Started 42 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Monitor Dashboard: Feature Adoption and stay abreast of which security features you’re using
in your deployment and potential gaps in coverage.
• Monitor Dashboard: CDSS Adoption - View security services or feature subscriptions and their
license usage in your devices to identify security gaps and harden the security posture of your
enterprise.
Strata Cloud Manager Getting Started 43 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Get visibility into the security status and trend of your deployment based on the security
postures of the onboarded NGFW devices with Dashboard: Security Posture Insights and be
alerted when incidents occur or your security settings may need a closer look.
Strata Cloud Manager Getting Started 44 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Generate BPA reports for (non-telemetry) PAN-OS devices running versions 9.1 and above,
now including feature adoption metrics.
Strata Cloud Manager Getting Started 45 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Use Policy Analyzer to quickly ensure that updates you make to your Security policy rules meet
your requirements and don't introduce errors or misconfigurations (such as changes that result
in duplicate or conflicting rules).
Strata Cloud Manager Getting Started 46 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
• Decryption
• Decryption Profile
• DNS Security Profile
• DoS Protection Rule
• DoS Protection Profile
• Device Setup
• Device Setup General
• Device Setup Authentication
• Device Setup Logging Reporting
• Device Setup Management Interface
• Device Setup Minimum Password Complexity
• Authentication Profile
• File Blocking Profile
• GlobalProtect
• Global Protect Portal
• Global Protect Gateway
• Log Forwarding Profile
• Policy Based Forwarding Rule
• SSL/TLS Service Profile
• URL Filtering Profile
• Vulnerability Protection Profile
• Zone
• Zone Protection Profile
Strata Cloud Manager Getting Started 47 ©2025 Palo Alto Networks, Inc.
Introducing Strata Cloud Manager
Strata Cloud Manager Getting Started 48 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Where Can I Use This? What Do I Need?
December 2024
Strata Copilot is now available for you to try in Strata Cloud Manager. Keep in mind
that Strata Copilot is learning and might sometimes make mistakes. Please share your
feedback with us as you go; we’ll use it to make copilot better. You’ll also notice that we
regularly release new features and updates to improve your copilot experience.
Chat with Strata Copilot—the ultimate AI-powered assistant—to get real-time, actionable insights
on the health and security of your network:
Find, understand, and resolve threats before they turn into problems
Identify the cause of degraded network and app experience
Open support cases when you want help to fix an issue quickly
Strata Copilot harnesses your network data and activity (from across NGFWs, Prisma Access,
and cloud security services) and combines this with Palo Alto Networks best practice guidance,
to give you clear, actionable answers. Strata Copilot is built inline to Strata Cloud Manager, and
its AI-driven, natural language interface simplifies how you interact with your network. With
increasing usage, Strata Copilot learns from your interactions and preferences to improve and
refine it’s responses to you. The data and insights that Strata Copilot shares with you depends on
the products you’re using with Strata Cloud Manager, your licenses, and your role permissions. If
you aren’t able to view certain data, Strata Copilot will notify you about any required licenses or
access permissions.
49
Strata Copilot
Strata Copilot serves as your intelligent companion for security management tasks across the Palo
Alto Networks ecosystem. Available in multiple global regions and supporting various products,
it enhances your ability to monitor, analyze, and secure your network infrastructure. This topic
outlines where Strata Copilot is available geographically, which product features it supports, and
the data sources it leverages to provide valuable insights.
Regional Access
Strata Copilot is available with Strata Cloud Manager in the following regions:
Region Countries
Asia • India
• Singapore
Strata Cloud Manager Getting Started 50 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Region Countries
• Japan
• China
• Taiwan
• Indonesia
Oceania • Australia
While Strata Copilot is generally available in these regions, regional restrictions may apply
on a per-feature basis.
Availability by Product
Strata Copilot support covers the following product and feature areas in Strata Cloud Manager.
Expansion of Strata Copilot support into additional product and feature areas is ongoing.
Feature Description
Strata Cloud Strata Copilot is supported with these license types and for the
Manager Essentials following features.
and Pro
Prisma Access Query and analyze Prisma Access Browser (PAB) event data to
Browser monitor user activity, bandwidth usage, and security risks. Gain
insights into website interactions, device distribution, peak usage
times, active users, and unauthorized data movements. Copilot
supports customizable time ranges for both current and historical data
analysis and includes predefined queries to streamline common PAB
data analysis tasks.
Additional data sets continuing to be added.
Strata Logging Expedite investigations and analysis using AI-assisted search and
Service workflows in Log Viewer. The workflows enable you to quickly explore
logs stored in the Strata Logging Service to help you investigate traffic
encryption, overall network traffic patterns, user behavior and access
control, and connectivity issues.
Autonomous DEM, View comprehensive insights across various connection types in your
including Access SASE environment and troubleshoot access issues to identify and
Analyzer resolve authentication, network, and security-related problems.
Strata Cloud Manager Getting Started 51 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Feature Description
AI-Powered ADEM View end-to-end insights for all Prisma Access mobile user traffic.
ADEM is an add-on service that you can purchase for Prisma Access.
Additional data sets continuing to be added.
AIOps for NGFW Obtain real-time insights, analyze security gaps, optimize performance,
ensure compliance, predict issues, recommend configurations, guide
incident response, and identify trends, all based on device telemetry
and best practices analysis for next-generation firewall deployments.
Additional data sets continuing to be added.
IoT Security Manage your IoT devices, monitor their security alerts, assess device
vulnerabilities, and gain insights into your IoT network's overall health
and risk posture.
Strata Cloud Manager Getting Started 52 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 53 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Copilot is an innovative AI-powered assistant that revolutionizes your experience with
Strata Cloud Manager. This powerful tool offers intuitive interactions, real-time data analysis,
and intelligent responses to help you navigate and optimize your cloud environment with
unprecedented efficiency.
Getting started with Strata Copilot is simple and intuitive. Access the assistant directly from the
Strata Cloud Manager interface and start querying your infrastructure using natural language.
Strata Copilot also supports a comprehensive prompt library with proven query patterns for
various scenarios, including resource utilization analysis and compliance verification.
Strata Copilot responds with various output formats including detailed text explanations, visual
representations of resource relationships, performance dashboards, and executable automation
scripts. From generating summary articles and visualizations to offering AI-assisted workflows,
Strata Copilot adapts to your needs, making cloud infrastructure management more accessible
and effective.
As you interact with Strata Copilot, the underlying machine learning models continuously refine
response accuracy based on your specific environment and usage patterns, making the assistant
increasingly valuable for both routine operations and complex infrastructure management tasks.
Strata Cloud Manager Getting Started 54 ©2025 Palo Alto Networks, Inc.
Strata Copilot
The first time you launch Strata Copilot, you will be prompted to review and agree to the
Supplemental End User License Agreement.
To accept the Supplemental End User License Agreement, you must be assigned one of the
following roles:
• Superuser
• Network Administrator
• Security Administrator
• Multitenant Superuser
First Look
To interact with Strata Copilot, you can Search keywords or start a query. Learn how to best
prompt Strata Copilot to quickly get to the information you need.
You can also:
• Start a Conversation by choosing a suggested prompt. These prompts highlight commonly-
asked questions or topics based on your context and location in Strata Cloud Manager. Over
time, these curated prompts are responsive to your viewing history and preferences, too.
• Engage in a dialogue with Strata Copilot, allowing for multi-turn conversations where you can
iterate or ask follow-up questions to refine your results.
• Open a Technical Reference; these references are context-sensitive; Strata Copilot
surfaces the most relevant technical documentation topics based on where you're in
Strata Cloud Manager.
Strata Cloud Manager Getting Started 55 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Response Types
Strata Copilot responses can take different forms depending on your prompt and the information
you seek.
Remember to double-check that all Strata Copilot responses are complete and accurate; Strata
Copilot is learning, and can sometimes make mistakes. If the first response Strata Copilot gives
you isn't right, consider if you can provide more context or detail in your prompt. See if this helps
Strata Copilot to refine it's response.
• Summary articles—Strata Copilot aggregates and summarizes knowledge from all Palo
Alto Networks resources, including technical documentation, knowledge base articles, and
community content, to provide concise, comprehensive answers. Each response includes
Strata Cloud Manager Getting Started 56 ©2025 Palo Alto Networks, Inc.
Strata Copilot
numbered citations to the primary sources used, allowing you to access the original content for
further review.
Strata Cloud Manager Getting Started 57 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 58 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 59 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 60 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 61 ©2025 Palo Alto Networks, Inc.
Strata Copilot
narrow or expand the data that the charts display, and download chart images. You can specify
preferred visualization types directly in your prompts and follow-up questions.
Strata Cloud Manager Getting Started 62 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 63 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 64 ©2025 Palo Alto Networks, Inc.
Strata Copilot
• AI-assisted workflows—Strata Copilot provides the ability to act on information that you
supply in Log Viewer search queries, enhancing its functionality beyond information retrieval.
You can prompt Strata Copilot to perform specific actions based on the context. Examples
Strata Cloud Manager Getting Started 65 ©2025 Palo Alto Networks, Inc.
Strata Copilot
of actions include searching for IOCs, searching the configuration, navigating to an area in
Strata Cloud Manager, marking apps as sanctioned, and quarantining devices.
Device quarantine is accessible across key areas of the platform, including from the Strata
Cloud Manager Summary, Prisma Access Configuration Overview, and Devices management
Strata Cloud Manager Getting Started 66 ©2025 Palo Alto Networks, Inc.
Strata Copilot
pages. You can initiate device quarantine by providing either the host ID alone or both the host
ID and device serial number.
Strata Cloud Manager Getting Started 67 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 68 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Prompt Examples
Looking for inspiration to get the most out of your Strata Copilot experience? Browse through
these example prompts organized by feature area. While not exhaustive, these examples
represent commonly useful queries to help you quickly leverage Strata Copilot's capabilities.
Activity Insights | NGFW Alerts | Prisma Access Browser | Prisma Access SD-WAN | Data Security
| IoT Security | Visualization & Reporting
Activity Insights
Category Prompt
Performance • What are the top applications with poor TLS versions affecting
Monitoring performance?
• How does application performance vary during peak hours?
• What is the impact of TLS 1.3 on our network latency and
throughput?
• Are there recurring performance issues with specific applications?
• Can we identify any correlation between device types and
application performance issues?
User Experience • What are the average user experience scores across different
Assessment network conditions?
• How does device type affect user experience scores?
Strata Cloud Manager Getting Started 69 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Prompt
• What network conditions lead to the worst user experiences?
• Are there specific locations facing frequent user experience issues?
• How do changes in bandwidth allocation affect user experience?
Network Integrity • What is the current uptime for all our Prisma Access locations?
and Status
• Are there any locations experiencing higher than usual incident
rates?
• How does bandwidth usage correlate with incident occurrences?
• What are the common categories of incidents across our network?
• Which locations have the most stable network conditions?
Network • What are the current IP pool allocations and usage rates?
Configuration and
• How are public IPs being utilized across different locations?
Resource Allocation
• Are there any over-allocated or under-utilized resources?
• How frequently are access permissions reviewed for compliance?
• What changes in network configuration have occurred in the last
quarter?
Trend Analysis • What are the recent trends in mobile user network activity?
• How has application traffic changed over the past year?
• Are there emerging security threats based on recent incident
trends?
• What applications are most used during different times of the day?
• Which network segments are experiencing growth in data usage?
Service Stability and • How stable are the connections for our branch sites over the last
Performance month?
• What are the average downtime instances per branch site?
• Which service areas have shown improvement in performance after
upgrades?
• Are there specific times when service stability issues peak?
• What measures have effectively improved service performance?
Strata Cloud Manager Getting Started 70 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Prompt
• Quarantine a Prisma Access device with {host_id}
NGFW Alerts
Category Questions
Alert Management • What is the average time it takes to resolve NGFW alerts of priority
and Analysis {alert_priority} in past {duration_value} days?
• What are the top {num_count} oldest NGFW alerts?
• What are the top {num_count} frequently seen NGFW alerts of
category {alert_category} in my deployment?
• What {alert_state} NGFW alerts in past {duration_value} days have
generated PANW support case?
• How many times in past {duration_value} days did NGFW alerts
with priority of {alert_priority} occur in my deployment?
Category Questions
User Activity and • Which users have been most active in the last {duration_value}
Behavior {duration_unit}
• Display the distribution of active devices in last {duration_value}
days
• Display the peak usage hours of Prisma Access Browser across all
users in the last {duration_value} {duration_unit}
Strata Cloud Manager Getting Started 71 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Questions
• How many Prisma Access Browser users have there been in the last
{duration_value} days?
File Management and • List all activities involving compressed file extensions in the last
Interactions {duration_value} {duration_unit}
• What are the most common file types uploaded across the
organization, in the last {duration_value} {duration_unit}?
• What are the most common file types downloaded across the
organization, in the last {duration_value} {duration_unit}?
• List all activities involving file uploads to cloud storage services in
the last {duration_value} {duration_unit}
• List all file downloads heavier than {num_count} MB by user and
timestamp, in the last {duration_value} {duration_unit}
Web Interaction • List top {num_count} non-app URLs that are visited the most in the
Analytics last {duration_value} {duration_unit}
• What are the top {num_count} most interacted websites across all
users in the {duration_value} {duration_unit}
• What are the top {num_count} most interacted websites at non-
business hours in the last {duration_value} {duration_unit}
Category Questions
Application Usage • What are new applications on the network seen in the past
and Performance {duration_value} {duration_unit} that were not seen in the prior?
• What are the top {num_count} collaboration apps in the past
{duration_value} {duration_unit}?
• What top {num_count} apps have the lowest health score in the
past {duration_value} {duration_unit}?
• Which applications have had the most failed connection attempts in
the past {duration_value} {duration_unit}?
• What are the top applications with packet loss in the past
{duration_value} {duration_unit}?
• Which applications have the highest data transfer rates?
Strata Cloud Manager Getting Started 72 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Questions
• How many HA failover events have occurred in the past
{duration_value} {duration_unit}?
• Show me critical process restarts in the past {duration_value}
{duration_unit}.
• List the top sites with incidents of category {incident_category}.
Site and Network • Which sites have been down repeatedly in the last {duration_value}
Management {duration_unit}?
• Analyze the trend of sites that have been down in the last
{duration_value} {duration_unit}.
• Which site is consuming the most bandwidth over the past
{duration_value} {duration_unit}?
• Show me the list of sites with {carrier} network down in the past
{duration_value} {duration_unit}.
• List the sites that have went down in the last {duration_value}
{duration_unit}.
User Behavior and • Which users have shown the most traffic volume growth in the past
Traffic Analysis {duration_value} {duration_unit}?
• How many unique users are using my network over the past
{duration_value} {duration_unit}?
• Show me a breakdown of users per site, sorted by most users to
least user count over the past {duration_value} {duration_unit}.
• For username {user} what are the top {num_count} applications in
the past {duration_value} {duration_unit}.
Network Carriers and • What is the traffic distribution per carrier across my network in the
IP Management past {duration_value} {duration_unit}?
• How many unique Source IPs are in my network over the past
{duration_value} {duration_unit}?
• Who are the top {num_count} source IPs by traffic volume in my
network over the past {duration_value} {duration_unit}?
• What Source IP addresses have shown the most traffic volume
growth in the past {duration_value} {duration_unit}?
Data Security
Category Questions
Incident Detection • How many new saas incidents have been detected in the last
and Analysis {duration_value} {duration_unit}?
Strata Cloud Manager Getting Started 73 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Questions
• What are the top applications we detected saas incidents on in the
last {duration_value} {duration_unit}?
• How many new inline incidents have been detected in the last
{duration_value} {duration_unit}?
• What are the top applications we detected inline incidents on in the
last {duration_value} {duration_unit}?
Incident • Who are the top assignees for all open saas incidents?
Management
• Who are the top assignees for all open inline incidents?
Application and Asset • What are the top high risk applications used in my organization?
Risk Assessment
• What are the top unsanctioned applications used in my
organization?
• What are the top tolerated applications used in my organization?
• What is the data risk for {application_name}?
• What are the top applications with highest impacted users in the
past {duration} hours?
Asset Exposure and • What are the top sensitive assets with {exposure} exposure?
Ownership
• Who are the top users who own assets with {exposure} exposure?
• Who are the users who own assets which have {data_profile} data?
• Who are the high data risk users owning sensitive assets in my
organization?
• What are the high risk sensitive assets owned by {user}?
IoT Security
Category Questions
Device and Network • What are the top category of devices in my network by number of
Inventory devices?
• What are the most common vendors of type {device_type} devices
in my network?
• Where are my category {device_category} devices?
• Where are my type {device_type} devices?
• What are my top device vendors by number of devices?
Security Posture and • Are there devices with weak security posture in my network?
Risk Analysis
• What device categories have a higher number of risky devices?
• Which devices are affected by vulnerabilities exploited in the wild?
Strata Cloud Manager Getting Started 74 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Questions
• What are the riskiest vulnerabilities that can be exploited remotely?
• Where are my riskiest devices?
Network • Which subnets have mixed business critical IoT devices with IT
Segmentation and devices?
Critical Assets
• Which subnets have a higher number of risky devices?
• Which subnets have devices of type {device_type}?
• Which subnets have devices of category {device_category}?
• What are my risky subnets?
Device Utilization • How many category {device_category} devices have been offline for
and Downtime more than {duration_value} {duration_unit}?
• How many type {device_type} devices have been offline for more
than {duration_value} {duration_unit}?
Alert Management • What are the new security alerts I should pay attention to?
Strata Cloud Manager Getting Started 75 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Category Questions
Threat Trends and • Show the trend of detected threats in the last {duration_value}
Distribution {duration_unit}?
• What is the threat category distribution in the past {duration_value}
{duration_unit}?
• Show me the breakdown of threat activity by allowed vs blocked
actions
URL Monitoring and • What is the risk level breakdown of URL activity?
Security
• What are the top risky URLs in my network?
• Show me the most common blocked URLs by risk category.
• Show me the total URLs accessed between {start_time} and
{end_time}?
Policy and Guidelines • List the policies for the URL {uri}
for URLs
• Outline the rules pertaining to the website {uri}
Strata Cloud Manager Getting Started 76 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Copilot is your versatile AI assistant designed to enhance your experience with Strata
Cloud Manager. To ensure the best product experience possible, we continuously improve Strata
Copilot's functionality and responses based on your valuable feedback. You can leverage Strata
Copilot to troubleshoot Strata Cloud Manager issues, open support cases, and gain insights. By
mastering Strata Copilot's capabilities, you'll optimize your workflow, quickly address challenges,
and maximize the potential of your Strata Cloud Manager environment.
Strata Cloud Manager Getting Started 77 ©2025 Palo Alto Networks, Inc.
Strata Copilot
After you begin the process of opening a support ticket, Strata Copilot guides you through an
intelligent case creation process. It begins by collecting all necessary information upfront, ensuring
that no crucial details are missed. Strata Copilot ensures comprehensive information gathering
through mandatory data fields for each case type, while still maintaining flexibility for critical
severity cases. As you provide information, the system conducts an automated analysis using
category-specific playbooks, including a dedicated playbook for commit issues.
Strata Cloud Manager Getting Started 78 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Throughout this process, you'll receive real-time updates, keeping you informed of the playbook's
progress. If you need to step away, Strata Copilot preserves your case creation state for one hour,
allowing you to resume if interrupted.
As Strata Copilot processes your input, it also leverages your case details to provide relevant
technical content resources. These resources are designed to help you quickly address issues on
your own, potentially resolving your problem without the need to wait for a case agent. If you find
that you still need support after reviewing the provided resources, you can easily proceed with
submitting the case, now enriched with all the necessary information for swift resolution.
This workflow provides you with a streamlined and effective support experience.
Strata Cloud Manager Getting Started 79 ©2025 Palo Alto Networks, Inc.
Strata Copilot
Strata Cloud Manager Getting Started 80 ©2025 Palo Alto Networks, Inc.
AI Canvas
Where Can I Use This? What Do I Need?
AI Canvas is available in beta for select customers. To participate, please reach out to your
account representative or email [email protected] with
your TSG ID.
AI Canvas is a no-code data exploration tool that revolutionizes how you interact with your
security data. Through its flexible, intuitive interface, you can seamlessly explore and visualize
your data without the constraints of traditional dashboards.
While conventional approaches require navigating multiple screens and applying complex
filters, AI Canvas empowers you to ask questions in natural language and receive immediate
insights. This transformative approach delivers four key advantages: speed—obtaining instant
insights without waiting for new reports; simplicity—using plain English instead of complex query
languages; flexibility—creating and arranging widgets to suit your specific needs; and collaboration
—saving and sharing canvases with colleagues.
Security remains paramount with AI Canvas, as it fully honors role-based access control (RBAC).
This ensures users can only access, create, view, and share data they're authorized to see. While
widgets and canvases are personal by default, they can be easily shared with other Strata Cloud
Manager users when needed.
When troubleshooting, AI Canvas eliminates the fragmented experience of gathering information
from multiple sources. You can build focused canvases that consolidate all relevant data into a
single view. AI Canvas further enhances user confidence through transparent error messages and
clear explanations of generated queries, making complex data exploration accessible to everyone.
81
AI Canvas
Core Components
At its core, AI Canvas consists of widgets and canvases:
• Widgets—Individual data visualizations created through natural language queries or Strata
Copilot. These widgets can display various types of charts, tables, and other visualizations
based on your security data. The widget library serves as a repository for all created widgets,
allowing for easy reuse and management.
• Canvases—Customizable workspaces where administrators can assemble multiple widgets
using drag-and-drop functionality. A canvas provides a comprehensive view of related security
data, eliminating the need to switch between different dashboards.
Strata Cloud Manager Getting Started 82 ©2025 Palo Alto Networks, Inc.
AI Canvas
Data Sources
Currently, AI Canvas supports the following data sources:
• Prisma Access logs and metrics
• Log Viewer data (Threat, Traffic, URL logs)
Strata Cloud Manager Getting Started 83 ©2025 Palo Alto Networks, Inc.
AI Canvas
Create an AI Canvas
Where Can I Use This? What Do I Need?
Strata Cloud Manager Getting Started 84 ©2025 Palo Alto Networks, Inc.
AI Canvas
Strata Cloud Manager Getting Started 85 ©2025 Palo Alto Networks, Inc.
AI Canvas
• Rearrange widgets
STEP 5 | Click the palette icon at the top right to adjust the color story for your AI Canvas.
Four seasonal color palettes are available.
Strata Cloud Manager Getting Started 86 ©2025 Palo Alto Networks, Inc.
AI Canvas
Manage Widgets
Where Can I Use This? What Do I Need?
AI Canvas allows you to create and manage widgets that visualize your data. From AI Canvas, you
can create new widgets and access your widget library for customization and organization.
Strata Cloud Manager Getting Started 87 ©2025 Palo Alto Networks, Inc.
AI Canvas
STEP 1 | Enter a query in natural language for the data you want to visualize, choose the data source,
and then click the arrow to run the query.
For tips on crafting effective natural language queries, see AI Canvas Best Practices.
STEP 2 | Use the chart controls at the top of the widget to preview different displays for your data.
STEP 3 | If you are satisfied with the visualization, Add to Widget Library.
Strata Cloud Manager Getting Started 88 ©2025 Palo Alto Networks, Inc.
AI Canvas
Strata Cloud Manager Getting Started 89 ©2025 Palo Alto Networks, Inc.
AI Canvas
STEP 2 | To view a widget in more detail and refresh the display, select the widget.
Strata Cloud Manager Getting Started 90 ©2025 Palo Alto Networks, Inc.
AI Canvas
STEP 3 | Use the chart icons at the top left of the chart to switch between your preferred visualization
chart type.
The options that are available vary by the type of data. Examples include bar chart (stacked
and grouped), table, multi-line graph, map, donut and more.
STEP 4 | Use additional controls on the top right of the chart to zoom in or out on specific data.
The chart will refresh to show data in your narrower or expanded view.
STEP 5 | If you suspect the data may have changed recently, you can also Regenerate the widget.
You can either export the raw data to table form, or you can export the current visualization as
a PNG file.
Strata Cloud Manager Getting Started 91 ©2025 Palo Alto Networks, Inc.
AI Canvas
STEP 8 | If you haven't already, proceed to create an AI Canvas and add the new widget.
STEP 2 | From the more actions menu ( ) for a widget select Delete.
If the Delete option is grayed out, it means the widget is currently in use. You must
first remove the widget from all canvases before you can delete it.
Strata Cloud Manager Getting Started 92 ©2025 Palo Alto Networks, Inc.
AI Canvas
Strata Cloud Manager Getting Started 93 ©2025 Palo Alto Networks, Inc.
AI Canvas
• Detect anomalies.
Look for unusual patterns or outliers:
• "What unusual traffic patterns were observed today?"
• "Identify any spike in failed login attempts this week."
Prompt Samples
Use these sample prompts as starting points for your own queries:
Threat Analysis
• Show me the top 5 threat categories, subcategories, and severities in the last 24 hours
• Show me top affected users by those top 5 threats
• Show me the top affected users and threat count in the last 24 hours
• Show me the top 5 users along with their threat ID, source IP, and destination IP for threat
category C2
• Show me the top threats by session
• Show me the top threat subcategories by session
• Show me the number of threats per PA location
Application Analysis
• Can you show me the top 10 risky applications that are accessed by top affected users
• Top 10 applications with highest impacted users in the past 3 hours
• Show me top applications in the last 30 days
• Which users are using the highest-risk applications
• What are the most used applications
• Which users were denied application access in the last 7 days
User Analysis
• How many users are using GlobalProtect version 6.3.3 and what are their names?
• How many users have been seen in the last week running GlobalProtect version 6.3.3?
• How many Prisma Access users in the last 30 days
• Show me top 10 users with high bandwidth
Strata Cloud Manager Getting Started 94 ©2025 Palo Alto Networks, Inc.
AI Canvas
Strata Cloud Manager Getting Started 95 ©2025 Palo Alto Networks, Inc.
AI Canvas
Export a Canvas
If you want to export a canvas, you can save it as a professionally formatted PDF.
STEP 1 | From AI Canvas, open the canvas you want to export.
Share a Canvas
You can generate a shareable link that other administrators can use to quickly view a snapshot of
a canvas. AI Canvas preserves the view of the data in the canvas at the time it was shared.
STEP 1 | From AI Canvas, open the canvas you want to export.
STEP 3 | Copy link to save it to your clipboard and then Close the dialog.
STEP 4 | Paste the link in your preferred communication tool of choice to send to the administrator.
The administrator must log in to the Strata Cloud Manager with their credentials to view the
canvas snapshot.
Delete a Canvas
There are two ways to delete a canvas:
•
From the Canvas List: Use the Delete option in the more actions ( ) menu
• Within an open canvas: Click the delete icon located at the top of the canvas
Strata Cloud Manager Getting Started 96 ©2025 Palo Alto Networks, Inc.
AI Canvas
Troubleshoot AI Canvas
When working with AI Canvas, you might encounter situations where your queries return no
results. To resolve this issue:
• Verify that your time range settings are appropriate for the data you're seeking
• Try refining or broadening your natural language query to better match available data
• Review the prompting best practices and sample queries for guidance on effective query
phrasing
• Use the Help icon located on the widget to find recommendations for effective query phrasing
Strata Cloud Manager Getting Started 97 ©2025 Palo Alto Networks, Inc.
AI Canvas
Strata Cloud Manager Getting Started 98 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud
Manager
Where Can I Use This? What Do I Need?
The Strata Cloud Manager Command Center is your new NetSec homepage; it is an interactive
visual summary that will help you assess the health, security, and efficiency of your network.
The command center provides a consolidated view of the NetSec platform, and gives you
comprehensive visibility into your Sources, Applications, Prisma Access deployment, your
NGFWs, and your security services in a single place.
99
Command Center: Strata Cloud Manager
The command center enables you to interact with the data and visualize the relationships
between events on the network, so that you can take immediate actions to strengthen your
security.
The command center is integrated with the new Activity Insights dashboards (Insights > Activity
Insights), and will highlight anomalies detected by your onboarded licenses and subscriptions
through actionable insights, and provide a path to remediate those anomalies.
From the new homepage, you can see:
• A comprehensive view of all traffic on your network flowing between sources (users, IoT
devices, external hosts) to applications (internet, SaaS, private).
• How assets such as users, devices, and applications are being accessed and secured.
• Navigate to specific dashboards with context for deeper understanding of the issues impacting
your network.
• Types of threats encountered while users are working.
Launch Strata Cloud Manager and click Command Center ( ) to get started.
Strata Cloud Manager Getting Started 100 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
The command center automatically refreshes data every 5 minutes and displays the last 24 hours
of data by default. You have the option to filter this data for different time periods: the past 1
hour, 3 hours, 7 days, or 30 days.
Each command center view displays different types of visual data flowing from the sources,
through Prisma Access and NGFWs or security subscriptions deployed on your network, to the
various applications on your network.
The Sources bubbles (hybrid workers, office users, IoT devices, Prisma Access Browser-Enabled
users, and others) are on the left and the Applications bubbles (accessed on the internet, SaaS,
and hosted on-prem or in-cloud) are on the right. The application bubbles display the top three
most used applications in each category.
Strata Cloud Manager Getting Started 101 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Sources include:
• IoT Devices – Devices discovered by an active IoT Security license and enabled.
• Users – Remote and Branch users.
• Other – Internal and external hosts accessing resources on the internet.
Applications include:
• Internet Apps – Applications accessed using a web browser.
• SaaS Apps – Cloud apps owned and managed by an application service provider.
• Private Apps – Applications hosted in a data center.
You can filter the data in the central view by clicking on the bubbles for sources, deployments,
or applications. This will provide you a more detailed view of the tracked data for that view in
relation to the bubble selected.
By selecting filters ( ), you can filter the data in the command center views by Tenant orNGFW
or Prisma Access specific data.
Hovering over the sources allows you to see the Agent-Enabled User Devices and PA Browser-
Enabled User Devices.
With an AI Access license, you can filter the traffic in all command center views by GenAI Apps
only to better evaluate how GenAI apps in use by users on your network might be affecting your
data security.
For more information on AI Access Security and AI Access Security licenses, see AI Access
Security.
With an Strata Cloud Manager Pro license, you can enable the Quantum Readiness View to start
evaluating your post-quantum cryptography (PQC) posture.
For more information about PQC, Quantum Security, and Quantum Readiness, click here.
Strata Cloud Manager Getting Started 102 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
When looking at one of the views, you can mouse over the lines for more information about your
network, such as the traffic or the threats blocked or allowed on your network.
Strata Cloud Manager Getting Started 103 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Below the central visual summary are several key metrics tracked by your activated subscriptions
that provide actionable insights into your network. These key metrics provide the ability to
navigate to one of several detailed context pages where you can find more information about the
metrics that have surfaced and drill-down into possible solutions.
Strata Cloud Manager Getting Started 104 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Strata Cloud Manager Getting Started 105 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
The lines in the central Summary view represent the data transfers and traffic on your network,
with the thickness of the lines representing the volume of data being transferred from sources
and applications.
You can see how these sources are being secured by your network infrastructure:
Strata Cloud Manager Getting Started 106 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Click through to the Activities Insights (Insights > Activity Insights > Threats) screen for a more
detailed breakdown of threats on your network.
Strata Cloud Manager Getting Started 107 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Click through to the Data Security view (Command Center > Data Security) for a more detailed
breakdown of sensitive data on your network.
Click through to the AI Access Security (Insights > AI Access) dashboard in Activity Insights for
a more detailed breakdown into GenAI app adoption on your network and recommendations for
how to better secure your data.
For more information about how your organization can safely adopt GenAI applications
while mitigating risks to your data security, see AI Access Security.
Strata Cloud Manager Getting Started 108 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Threats
The Threats view shows the traffic inspected on your network and threats detected by your
CDSS subscriptions. You can use this view to monitor the blocked and alerted threats on your
network or investigate areas of your network that need updated policies to better block any
alerted threats.
The lines in the central Threats view represent the traffic being monitored by your security
subscriptions, with the thickness representing the volume of threats detected and the color
representing if the threats are of critical, high, medium, or low severity.
Security Subscriptions
The Security Subscriptions widget gives you a view into your Cloud-Delivered Security
Subscriptions, which ones are active, and a snapshot of how they are securing your network.
Subscription Description
Strata Cloud Manager Getting Started 109 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Subscription Description
sophisticated—and targeted, advanced threats perpetuated
by organized cyber adversaries.
DNS Security Automatically secure your DNS traffic by using Palo Alto
Networks DNS Security service.
Clicking on the Security Subscriptions widget (Command Center > View Security Subscriptions)
gives you a detailed report of the status of your subscriptions in relation to your NGFWs and
Prisma Access deployments. Click Back to the Dashboard to return to the Threats view.
Strata Cloud Manager Getting Started 110 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Click through to the Activities Insights (Insights > Activity Insights > Threats) for a more detailed
breakdown of threats on your network.
Click through for a more detailed table of all the threats impacting your network (Insights >
Activity Insights > Threats).
Strata Cloud Manager Getting Started 111 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Operational Health
The Operational Health view shows the health of infrastructure and user experience on your
network. You can use this view to monitor the health of your NGFWs and Prisma Access
deployments as well as the user experience on your network and review the severity of open
incidents in each area.
The lines in the central Operational Health view represent all the users on your network. The
users are organized by user experience score, with the colors of the lines representing a rating of
good, poor, or unmonitored.
Strata Cloud Manager Getting Started 112 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
The widget tracks the percent change in open incidents based on the time period selected.
Click through to the Incidents and Alerts dashboard for each available scope (Incidents and Alerts
> Prisma Access / NGFW > All Incidents).
Click through to the Incidents and Alerts dashboard (Incidents and Alerts > Prisma Access /
NGFW / Prisma SD-WAN) for more details on the incidents.
Strata Cloud Manager Getting Started 113 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Click through to the Application Experience dashboard (Dashboards > Application Experience)
for a more detailed breakdown of experience across your network and performance metrics.
Strata Cloud Manager Getting Started 114 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Best Practices
Strata Cloud Manager Getting Started 115 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Data Security
The Data Security view shows all the sensitive data detected across your network and various
connected SaaS applications. You can use this to monitor and identify high risk sensitive data
flows in your organization.
The lines in the central Data Security view represent sensitive data being detected through data
at rest and data in motion security solutions, with the thickness of the lines representing the
quantity of data and the color representing whether that data has been flagged or classified as
critical, high, medium, or low risk.
Security Subscriptions
The Security Subscriptions widget gives you a view into your Data Security Subscriptions, which
ones are active, and a snapshot of how they are securing your network.
Subscription Descrition
Strata Cloud Manager Getting Started 116 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Subscription Descrition
SaaS Inline The SaaS Inline solution works withStrata Logging Service to
discover all the SaaS applications that are being used on your
network.
SaaS API SaaS API is a cloud-based service you can connect directly
to your sanctioned SaaS applications using the cloud app’s
API and provide data classification, sharing or permission
visibility, and threat detection within the application.
Clicking on the Security Subscriptions widget (Command Center > View Security Subscriptions)
gives you a detailed report of the status of your subscriptions in relation to your NGFW and
Prisma Access deployments. Click Back to the Dashboard to return to the Data Security view.
Strata Cloud Manager Getting Started 117 ©2025 Palo Alto Networks, Inc.
Command Center: Strata Cloud Manager
Click through to the Data Loss Prevention dashboard (Manage > Configuration > Data Loss
Prevention) to review all predefined data profiles and add custom data profiles.
Data Trend
The Data Trend widget shows trend in sensitive data monitored by your data security
subscriptions, organized by the percent change in total assets, data risks, and posture violations.
Click through to the Data Risk dashboard (Manage > Configuration > Data Loss Prevention >
Data Risk) to understand your overall data risk score and review actionable recommendations to
improve the data security posture of your organization.
Strata Cloud Manager Getting Started 118 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Where Can I Use This? What Do I Need?
Activity Insights gives you an in-depth view of your network activities across Prisma Access and
NGFW deployments. This view unifies your network data such as network traffic, application
usage, threats, and user activities in one place. Activity Insights provides visualization, monitoring,
and reporting capabilities to you carry out your tasks easily. Once you have identified the areas
that need your focus with the Strata Cloud Manager Command Center, use the context links to
navigate to Activity Insights or other dashboards for further analysis.
Activity Insights has advanced filters to help you focus on the security aspects that matter
to your deployment. The advanced reporting functionality in Activity Insights enables you to
download, share, and schedule reports from the data in the Overview tab. The report presents
data separately for each filter applied in the dashboard. Alternatively, you can schedule reports for
Activity Insights and dashboards from the Strata Cloud Manager > Reports menu.
Launch Strata Cloud Manager and click Insights ( ) to get started.
119
Insights: Activity Insights
• Overview—Displays the data for applications, threats, users, URLs, and sessions with the
maximum number of activities involved within the selected time range. Glance through this
view to quickly identify any irregularities within your network and then delve deeper to
examine the activities that require investigation.
• Applications—Provides an overview of all the application usage in the network, including data
transfer, application risks and ADEM capabilities to monitor application experience.
• SD-WAN Applications—Displays the performance of Prisma SD-WAN applications with details
on health score over a time range, transaction statistics, and bandwidth utilization metrics.
• Threats—Provides a holistic view of all threats that the Palo Alto Networks security services
detected and blocked in your network.
• Users—Provides deeper insights into a user’s traffic and activities, including ADEM’s
capabilities to monitor user experience.
• URLs—Displays the URLs accessed in your network, how many of them are malicious, users
and applications accessing the URLs, rules allowing the URLs in your network, and enforcement
by your security services.
• Rules—Provides insights on the security policy rules permitting the traffic generated by users
and applications, threats detected in the traffic sessions, and URLs impacting the rule.
• Regions—Displays the network traffic details in relation to applications, users, threats, and
URLs.
• Projects—Gain visibility into your Prisma Access Agent deployment by using Strata Cloud
Manager to monitor your Dynamic Privilege Access project activity.
Strata Cloud Manager Getting Started 120 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
View the summary of most seen applications, threats, users, URLs, and rules in your network for
the selected time period. Glance through this view to quickly identify any irregularities within your
network and then delve deeper to examine the activity that requires investigation. The Overview
view includes:
• Top 5 applications and application categories in your network that have the maximum activity
in terms of number of sessions, data transfer, threats detected, URLs accessed, and users who
accessed the applications. Click View all Applications to refer to the application details.
• Top 5 threats and threat categories that are most affecting the sessions, users, and
applications. View the details of sessions, users, and applications in the Log Viewer, Users, and
Applications tabs, respectively.
• Network traffic trend of blocked, allowed, and alerted sessions, the amount of data transferred,
and users generating the most traffic.
• Top 5 users with most traffic sessions, data transferred, threats found in traffic, URLs accessed,
and the user experience scores for monitored applications.
Strata Cloud Manager Getting Started 121 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Most accessed URLs along with details on session, users, and applications accessing the URLs.
• Top 5 most impacted Security policy rules configured in your deployment with filters to know
the sessions, users, URLs, threats, data transferred, applications involved in the traffic matching
the rules.
You can use the filters to view the data points you want to focus on and relevant to your
deployment. These filters are available in all the tabs of the dashboard.
Filters
Activity Insights has advanced filters to help you focus on the security aspects that matter to your
deployment. The available filters are:
• Time Range—View data for a specified time period
• Scope Selection—Data specific to a deployment: Prisma Access, NGFW
• Subtenant—The Prisma Access instance for which the data is displayed
• User Name—View activities involving an individual user
• Application—Network events concerning a specific application
• Application Type—Type of application; SaaS, internet, private
• Threat Category—Data for a particular category of threat
• Threat Action—View specific to allowed or blocked threats
• URL Risk Level—Data concerning the URLs with specific risk level; high, medium, or low
• URL Category—Filter the data based on the URL categories
• Source Location—View activity that originated from a specific location
• Destination Location—View activity targeted to a specific region
• URL—Activity related to a specific URL accessed.
• SaaS Application—Data concerning a specific SaaS application
• Sanctioned Application—View data for sanctioned or unsanctioned applications only
• Port Type—Sort traffic from applications traversing through standard or nonstandard ports
• Protocol—See traffic that uses a specific TCP, UDP, or HTTP ports
• Source Type—View activity generated from a particular device, users, or others
Strata Cloud Manager Getting Started 122 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
For your convenience, Prisma Access lets you pick the Time Range from a few predefined ranges
or configure your own date and time range:
• Last 15 min
1 datapoint for every 3 minutes for a total of 5 datapoints.
• Last 1 Hour
1 datapoint for every 3 minutes for a total of 20 datapoints.
• Last 3 Hours
1 datapoint for every 3 minutes for a total of 60 datapoints.
• Last 24 Hours
1 datapoint for every 5 minutes for a total of 288 datapoints.
• Last 7 Days
1 datapoint for every 30 minutes for a total of 336 datapoints.
• Last 30 Days
1 datapoint for every 3 hours for a total of 180 datapoints.
Strata Cloud Manager Getting Started 123 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Custom
You can set a custom time interval (for example, date and the time example start at 5:00 pm on
June 1 and end at 4:00 pm on June 2) in addition to the prepopulated Time Range selections
available in the filter.
To set a start time, first select the date in the calendar, then select the time under Start. Apply
the start time, then set the end time by selecting an end date in the calendar and a time under
End.
Once you set a custom time range, it gets saved and applied across all widgets within Insights
that use the time range filter to display data instead of real-time data.
You can pick from prepopulated Time Range selections for custom time intervals:
• Last 15 min
1 datapoint every 3 minutes for a total of 5 datapoints.
• Last 1 Hour
1 datapoint every 3 minutes for a total of 20 datapoints.
• Last 3 Hours
1 datapoint every 3 minutes for a total of 60 datapoints.
• Last 24 Hours
1 datapoint every 5 minutes for a total of 288 datapoints.
• Last 48 Hours
1 datapoint every 30 minutes for a total of 96 datapoints.
• Last 7 Days
1 datapoint every 30 minutes for a total of 336 datapoints.
• Last 30 Days
1 datapoint every 3 hours for a total of 240 datapoints.
Reports
Click one of the icons in the Overview tab to download, share, and schedule reports from
the data in the Overview tab .
Strata Cloud Manager Getting Started 124 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Monitor the applications in your Prisma Access and NGFW setups, users using the application,
risk scores, user experience for each application, and understand the security impact posed by the
risky applications. Application Usage findings can help you to refine your security policy to control
unsanctioned and risky applications. Click Activity Insights > Applications to view the following
information:
Strata Cloud Manager Getting Started 125 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Application Data Transfer by—Total data download and uploaded across NGFW and Prisma
Access firewalls during the time range selected. You can filter to view data transfer originating
from the application category and flowing through the destination from the device (data center
or firewall).
• All Applications—Use this widget to see which Prisma Access applications are monitored with
synthetic tests running on them and applications running on your NGFW environments. The
table also displays their experience scores, which give you the health of each application.
• If you have a Prisma Access Browser subscription, you'll see a column for PA Browser
Events. Select the number of events, and it will redirect you to the Prisma Access Browser
management pages.
• You can also change the tag applied to Gen AI apps based on the application risk score to
reflect whether the application is approved within your organization. In the Actions column,
select the tag icon and choose the Sanctioned, Tolerated, or Unsanctioned tag and click
Apply.
•Column Description
App Risk Score The app risk score, with 1 being the lowest
risk and 5 being the highest risk.
Strata Cloud Manager Getting Started 126 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Column Description
Application Test Name (ADEM) The name of the test set up by the
user for this application.
• (Prisma Access applications only) You can download the data in the table in csv format. Click
the Manage Tests button to view all the synthetic tests that are set up for all your Prisma
Access applications in the Application Tests table. If you want to create a test to monitor an
application, click Monitor App to view Health under the User Experience column.
Strata Cloud Manager Getting Started 127 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Application Details—Select any application in the All Applications table to view general details
of the application along with details concerning application activity and application experience.
• About the app—View whether the application you selected is tagged as Sanctioned,
Tolerated, or Unsanctioned.
• App Risk—See information about this App Risk, including its risk score, ports used, and any
plugins used. Select View All Attributes for further information.
• Rules—The number of security policy rules matched against this application's traffic.
• Application ID—The application type and subcategory.
• Total Threats by Threat Type—View a graph of the number of threats by threat type that
this application faces.
• Total Users—View how many users have accessed this application during the time range
selected.
• Data Transfer—See how many times this application has been uploaded and downloaded
during the time range selected.
• Sensitive Data—Sensitive data detected by this application.
• The Activity tab shows the total number of threats seen in the application, total users
accessing the application, data transferred through the application, PA Browser Data Events,
and PA Browser Access Events.
• The following image shows Application Details about PA Browser Data Events and PA
Browser Access Events. The default view shows an Aggregate of all events and blocked
events, or you can choose to view a Breakdown by Event Type and Count.
Strata Cloud Manager Getting Started 128 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• The Experience tab shows the application experience score, score trend during the selected
time range, and network performance metrics.
If an app is a container app, then the displayed statistics are a roll-up of all the
applications in the container. For example, gmail is a container app (there is no App-ID for
gmail). It groups applications such as gmail-posting, gmail-downloading, gmail-uploading,
and so forth. The risk score set for this container app is the highest risk score found for the
contained applications. All other metrics are calculated by summing the values found for
the contained applications.
Reports—You cannot generate a report that covers the data in this view. However, you can use
the Application Usage report to view application usage data in your network. To schedule a
report, from the Strata Cloud Manager > Reports menu, click the icon and select Application
Usage from the Type drop-down.
App Acceleration
Where Can I Use This? What Do I Need?
App Acceleration addresses the causes of poor application performance and acts in real time
to mitigate them, improving the user experience for Prisma Access GlobalProtect and Remote
Network users.
When your users access applications, they might experience poor application performance caused
by decreased throughput, which could be caused by degraded wireless connectivity, network
congestion, and other factors. These networking issues can adversely affect the employee
experience and reduce their productivity. App Acceleration securely builds an understanding of
the device capability, network capability, and application context to maximize throughput and
adjusts in real-time to account for changing network conditions.
Strata Cloud Manager Getting Started 129 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
In Strata Cloud Manager Command Center, go to Insights > Applications to view details about
the applications that have been accelerated in your environment. The Prisma Access Applications
table includes the Avg. (Average) Throughout column, which you see only if your user's traffic is
accelerated, and the Accelerated column, which shows that some or all of your application traffic
has been accelerated.
Go to Insights > Users to view information about the App Acceleration users in your environment.
Your users with App Acceleration enabled in their environments have the Users | Devices table,
which shows the Traffic Accelerated column. This column indicates that some or all of users'
application traffic has been accelerated.
AI-powered Autonomous DEM (ADEM) integrates with App Acceleration and provides you with
metrics such as the number of applications that were accelerated and the performance boost
gained overall. Go to SASE Health > Experience to view ADEM performance metrics in the
Accelerated Applications and Monitored Applications tabs.
Strata Cloud Manager Getting Started 130 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• license
license to view certain widgets
View the top applications which are not performing well in Prisma SD-WAN. See the determined
health score of all poor applications, list of poor applications for a tenant based on health score,
and the average health score of poor applications for the last 3 hours in 5 minutes intervals.
• Application Health Distribution—(requires WAN Clarity license) The distribution of Good, Fair,
and Poor applications for a given tenant.
Strata Cloud Manager Getting Started 131 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• TCP Application Health Distribution Over Time—(requires WAN Clarity license) The
distribution of Good, Fair, and Poor TCP applications health distribution over a period of time.
The time-series graph should be computed and refreshed based on the selected duration. For
example, supported durations are 1 hour, 3 hours, one day, seven days, 30 days, and 90 days
and the interval is 1 minute, 5 minutes, 1 hour, and one day, respectively.
• New Flows—Displays the new TCP and UDP flows for an application, a specific set of
applications, or all applications for a given period. A TCP flow is considered a new flow when
it sees the first SYN packet. A UDP flow is considered a new flow when it sees the first UDP
packet in either direction. A flow is a sequence of packets in both directions identified by the
source and destination IP, source and destination port, and the protocol.
• Bandwidth Utilization—Displays the amount of bandwidth utilized on a trail in a network. Use
the chart to identify WAN congestion in a network that may hinder application performance.
It is a visual representation of bandwidth spike, total bandwidth consumed by a particular site,
and the application; if the upload is in ingress or egress direction. Move your cursor in the
Bandwidth Utilization chart to get a more granular view of the bandwidth utilization with an
application or time-stamp. Typically, the apps are listed in order of their bandwidth utilization.
• Transaction Stats—Provides transaction statistics on TCP flows, including initiation/transaction
successes and failures for a specific application or all applications, a particular path or all paths,
and all health events.
• Applications—Lists all the applications details such as Name, Application Profile, Health Score,
Impacted Sites, Traffic Volume, Init/Failure, and Transaction/ Failure. When you click the
application name, you can see the individual App Details on a new page.
Strata Cloud Manager Getting Started 132 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
CDSS licenses
will unlock additional Prisma Access
features
Get a holistic view of threat activity and various types of threats seen in your network. The tab
shows the total number of threat sessions seen in your Prisma Access, NGFW, and standalone
resolver (Advanced DNS Security Resolver) deployments, breakdown of the numbers based on
threat category and threat severity for the selected time period. You can search on a security
artifact (file hash, a URL, a domain, or an IP address (IPv4 or IPv6) associated with a threat to view
the Palo Alto Networks threat intelligence analysis and the third-party analysis findings.
Threat activity presented in Activity Insights can take up to 30 minutes to populate after
logs are forwarded to the Strata Logging service.
Strata Cloud Manager Getting Started 133 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
to exploit the system code, methods, proof of concept (POC)) is widely available and easy
to exploit. The attacker doesn't need any special authentication credentials, or knowledge
about individual victims.
• High—Threats that have the ability to become critical but have mitigating factors; for
example, they may be difficult to exploit, do not result in elevated privileges, or do not have
a large victim pool.
• Medium—Minor threats in which impact is minimized, such as DoS attacks that do not
compromise the target or exploits that require an attacker to reside on the same LAN as
the victim, affect only non-standard configurations or obscure applications, or provide very
limited access.
• Low—Warning-level threats that have very little impact on an organization's infrastructure.
They usually require local or physical system access and may often result in victim privacy or
DoS issues and information leakage.
• Informational—Suspicious events that do not pose an immediate threat, but that are
reported to call attention to deeper problems that could possibly exist.
• Total Sessions—The number of sessions where the threat was detected. Click the threat name
to view all related threat sessions in the specified time range. The threat session table provides
context on the threat such as time when the Palo Alto Network security services detected the
threats, users, rules, applications, devices impacted by the threat, and action taken (allowed or
blocked) on the threat.
• Total Users—The number of users exposed to the threat.
• Allowed Threats and Blocked Threats—Action enforced on the threat. Review the action to
ensure the actions are not triggering false positives on your network.
• Actions—Log history of the threat in the Log Viewer to aid in threat investigations.
Reports—You cannot generate a report that covers the data in this view.
Strata Cloud Manager Getting Started 134 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Prisma Access(with Strata Cloud Manager or You must have at least one of these licenses
Panorama configuration management) to use the Activity Insights:
• NGFWs(with Strata Cloud Manager or • Prisma Access
Panorama configuration management)
• Prisma Access Mobile User license
• AIOps for NGFW Free (use the AIOps
for NGFW Free app) or AIOps for NGFW
Premium license (use the Strata Cloud
Manager app)
• Strata Cloud Manager Essentials
• Strata Cloud Manager Pro
The other licenses needed to view the Activity
Insights: Users tab are:
• Strata Logging Service
• Advanced URL Filtering license
• Cloud Identity Engine license
• Advanced Threat Prevention license
• ADEM Observability will unlock additional
Prisma Access features
Monitor user activity in your Prisma Access and NGFW environment. Monitoring the user activity
helps to detect and stop potential threats, protect misuse of sensitive information, and adjust your
Security policy rule to close security gaps.
Users provides an overview of all users and hosts connected to Palo Alto Networks' security
solutions, which include Next-Generation Firewall (NGFW) and Prisma® Access. You can easily
determine a user's or host's connection status to NGFW or Prisma Access, whether at a branch
site, service connection, or remote location. You can view information about:
• The total number of unique users currently connected to Palo Alto Networks security solutions
and users connected to NGFW and Prisma Access.
• The number of users who are connected during a certain time range, broken down by users
connected through NGFW and Prisma Access.
• Agent-based users connected through NGFW and Prisma Access.
• Agent-based or browser-based Explicit Proxy users connected to NGFW and Prisma Access.
• Users connected through Enterprise Browsers.
• A list of unmanaged device users accessing Prisma Access.
• A list of users connecting from branch locations to Prisma Access.
Strata Cloud Manager Getting Started 135 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• A list of users connecting their data centers using specific service connections.
Users
In Strata Cloud Manager, go to Insights > Activity Insights > Users to view information about your
Prisma Access Agent Users, Agentless Proxy Users, Enterprise Browsers, Office Users, and Other
Hosts.
Strata Cloud Manager Getting Started 136 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Agent Users
Agent users connect through GlobalProtect or Prisma Access Agent. Select the number under
Agent Users to view details about your agent users.
View details about your Users, User Devices, and the number of currently connected users. You
can View Trend by Users or User Devices connected to Prisma Access at the time indicated in the
timestamp. From the Scope Selection drop-down, select All, Prisma Access, or NGFW users to
refine the data that appears. If you have an Autonomous DEM (ADEM) license, you can remove
NGFW from the drop-down to view ADEM-related data.
Baselines in Widgets
If you purchased the AI-Powered ADEM license, you see a baseline data band across the trend
widgets on the following Monitor pages: Users, Branch Sites, Data Centers, and Network Services.
The widgets show the baseline in the background across the trend lines. This allows you to view
at a glance whether your data has crossed the upper or lower boundaries of the baseline.
Baseline data is calculated in 1-hour bin sizes and takes into consideration the last 28 days of data
from those hour-long bins for a particular tunnel, site, Prisma Access location, or GlobalProtect
user count. For example, the baseline from 1:00 pm to 2:00 pm on Tuesday is calculated from
the 1:00 pm to 2:00 pm time frame on the previous four Tuesdays. The lower bound is the 10th
percentile of that historical data collected, and the upper bound is its 90th percentile. This allows
you to see trends for bandwidth, user counts, authentication counts, and DNS Proxy request and
response. Because the baseline data is taken from the last 28 days of historical data, the newly
onboarded tenants will need to be up and data rich for 28 days for the baseline to be calculated
correctly. If your data is less than 28 days, you may see some discrepancies.
Strata Cloud Manager Getting Started 137 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
When the values in the trend line in the widget deviate from the baseline's upper or lower limits,
the trend line for that period appears in red in the web interface.
The following example shows the GlobalProtect baseline from the Connected User widget on the
Users page.
Strata Cloud Manager Getting Started 138 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Strata Cloud Manager Getting Started 139 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• IP Pool Allocation—The IP pool utilization percentage on the graph is the number of IP pool
blocks used out of all the IP pool blocks that are available across all subnets. You can add
subnets when you see an IP pool bar approaching the maximum capacity for any region.
• Static IP Address Allocation provides an alternate means of allocating IPs to the agent users.
IP Pool Details shows IP pool utilization displayed under the IP Pool Name that comes from
the static IP pool configuration. Total IP Pool Profiles shows the number of utilized profiles in
the IP pool, and Total Unused IP Addresses shows the number of unused IP addresses in the IP
pool.
The IP Pool Details table shows:
• IP Pool Name—Unique IP pool name.
• Total IP Addresses—Total number of users in the IP pool.
• Active IP Addresses—Total number of active users in the IP pool.
• Peak Utilization Status—Highest percentage of use for the IP pool during the selected Time
Range.
• Last IP Assignment Timestamp—Most recent time the IP pool was active.
Strata Cloud Manager Getting Started 140 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Strata Cloud Manager Getting Started 141 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
The Web Browsing Summary shows details about the URLs the user has visited.
Strata Cloud Manager Getting Started 142 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Overview shows the number of unique URLs that the user has visited, Severity of URLs (High,
Medium, or Low), and the number of Malicious URLs the user has visited.
Most Visited Sites shows the most visited sites in order of number of times visited, Site
Category, Risk Level, and number of Sessions, or visits the user made to this site.
• Blocked shows the number of Blocked URLs the user tried to access, the Severity of Blocked
URLs (High, Medium, or Low), Malicious Blocked URLs, and Blocked URLS with Most Visited
Sites.
• Sessions shows:
• Total Hits—The number of times the user has accessed websites.
• Category Session Breakdown—Breaks down the types of sites the user visited.
• Top URL Categories for Sessions—The top categories, in order, that the user visited.
• Data Transfer shows the Total Data Transferred, Category Data Transfer Breakdown, and Top
URL Categories for Data Transfer table that shows Category, Unique URLs for each category,
and Data Transferred, in MB, for each category.
Application Summary shows information about the user's applications during the selected time
range.
Strata Cloud Manager Getting Started 143 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• Activity—The user's number of Total Apps, Applications by Risk Score, Top App Categories,
and a list of All Applications that shows each one's App Risk score. App risk scores are ranked
in numerical order from high (5) to low (0).
• Blocked—The user's Total Blocked Applications, Total Allowed Applications, and the Total
Blocked Applications table that shows a list of blocked applications by Application Name and
Rule.
• Sessions—Details about each time the user accessed each application. You can view the user's
number of Total Sessions, Category Sessions Breakdown, and the Top Used Applications,
which shows the number of user sessions for each application during the selected time range.
• Data Transfer—The Total Data Transferred, Category Data Transfer Breakdown, and Top
Applications with Data Transferred by Application Name and Data Transferred in MB.
Agent User Connectivity
Understand your user's device connectivity by reviewing the Connected User's Device Trend
chart, Connected User's Devices, and User Login & Logout Events on all devices.
Strata Cloud Manager Getting Started 144 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• The Connected Devices User Trend chart illustrates the number of devices that connect at
specific times during the selected time range. Hover over a point in the chart to view the
number of devices connected at that date and time.
• The Connected User's Devices table shows details about each of the user's connected devices,
by device name:
• Last User Source IP Address—Most recent user source IP address.
• Last Private IP—Most recent private IP address.
• Last User Location—User's most recent location.
• Last Login Time—Date and time the device last logged in.
• Last Logout Time—Date and time the device last logged out.
• Last Session Duration—How long the most recent session lasted.
• Auth Type—Auth type used.
• OS Family/Version—OS family and version used by the device.
• Agent Version—Agent version used by the device.
• Firewall/Location—Firewall or location used by the device.
Strata Cloud Manager Getting Started 145 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
• The User Login & Logout Events table gives details about the device's login and logout events:
• User Source IP Address—Device's user source IP address.
• Private IP—Device's private IP address.
• User Location—Device user's location.
• Login Time—Date and time the device is logged in.
• Logout Time—Date and time the device is logged out.
• Session Duration—How long the session lasted.
• Auth Type—Auth type used.
• OS Family/Version—OS family and version used by the device.
• Agent Version—Agent version used by the device.
• Firewall/Location—Firewall or location used by the device.
• Agent Type—Agent type used.
Strata Cloud Manager Getting Started 146 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Strata Cloud Manager Getting Started 147 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
To view the specific information related to your enterprise browser, use Connection
Method. You can select Enterprise Browser or any other supported third-party enterprise
browser.
Office Users
Office users physically occupy the office and connect internally. Even if they are not using
GlobalProtect or Enterprise Browser, they can still connect to internal applications such as
Strata Cloud Manager Getting Started 148 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Confluence or Jira. Branch users are included in the Office Users category. Select the number
under Office Users to view details about your users connected through Enterprise Browser.
Strata Cloud Manager Getting Started 149 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Other Hosts
The Other Hosts category shows IP addresses with traffic on the network, such as users' private
mobile phones that are not connected through GlobalProtect or internally as an office user.
Information for other hosts falls into two categories: internal and external hosts accessing
resources on the internet. Internal hosts serve on-site users, such as guests or employees using
their mobile phones in the office, and external hosts serve users, such as people visiting your
enterprise website.
Select the number under Other Hosts to view details about your other hosts.
Strata Cloud Manager Getting Started 150 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Select any connected user to see information about their devices' trend. The Connected User's
Devices table shows data about a user's devices, including the Last User Source IP Address and
Last Private IP, both of which can include IPv4 and IPv6 addresses for a single device entry.
You can view IPv6 address information in the User Login & Logout Events table. The User Source
IP Address and Private IP Address columns show either an IPv4 or IPv6 address.
Strata Cloud Manager Getting Started 151 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
The Domains page consolidates information to provide a unified view of domain activity. This
view summarizes the domain and URL activity in your Prisma Access, NGFW, and standalone
resolver deployments that the Advanced URL Filtering, Advanced DNS Security, and Advanced
DNS Security Resolver services have detected. You can get visibility into the total number
of domains detected in your network during the specified time period, the breakdown of
these domains by category and risk level, and use the filtering options to filter the view in the
dashboard.
Domain activity presented in Activity Insights can take up to 30 minutes to populate after
logs are forwarded to the Strata Logging service.
Strata Cloud Manager Getting Started 152 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
likely to expose your network to malicious and exploitative content. It's a best practice to block
these domains and URL categories.
• Review the high-risk domains, their impact on users, applications, and rules. High-risk domains
are not always malicious; however, they might still expose your network to threats. Consider
targeting these sites with strict decryption and Security policy rules.
• Analyze domain information from both URL Filtering and DNS Security, providing a
comprehensive view of domain activity across your network.
• Examine malicious domains detected by both services to enhance your threat prevention
strategies.
• (Advanced DNS Security Resolver) You can constrain the scope of the search to display
domains that have been processed by the Advanced DNS Security Resolver.
Reports—You cannot generate reports that cover the data in this view.
Strata Cloud Manager Getting Started 153 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
View the Security policy rules that are matched against all the traffic in your network. Security
policy rules determine whether to block or allow a session based on traffic attributes, such as the
source and destination IP address, the application, the user, and the service. All traffic passing
through your network is matched against a session and each session is matched against a Security
policy rule. When a session match occurs, the Security policy rule is applied.
The dashboard shows the following details of the network event matching the Security Policy
rule:
Traffic sessions, data transferred, threats detected in the sessions, users impacted, URLs browsed,
and applications accessed. Review the most matched rules to the traffic sessions, analyze those
sessions to understand if the rule is overly permissive and optimize the rule if required.
Reports—You cannot generate reports that cover the data in this view.
Strata Cloud Manager Getting Started 154 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
These are the regions from which the traffic originated in your network. The view provides
information on threats, users, URLs, network sessions, and data transfer originating from these
locations. You can also drill down to know the targeted location of the traffic. Click Actions to
view the traffic logs for the session. You can use the data to identify and narrow down regions
that are targets for threats attempting to infiltrate your network. Optimize the rule that applies to
the targeted regions.
There are filtering options to narrow down the traffic to and from a specific source and
destination regions. The other filtering options include:
• Traffic observed in a specific deployment; Prisma Access, NGFW
• Traffic to and from sanctioned or unsanctioned applications
• Traffic using specific port and protocols
• Traffic involving specific threat types, threat category, URL, and URL category
Reports—You cannot generate reports that cover the data in this view. However, you can utilize
the Network Usage report to view details about your network traffic. To schedule report, from
the Strata Cloud Manager > Reports menu, click the icon and select Network Usage from the
Type drop-down.
Strata Cloud Manager Getting Started 155 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Gain visibility into your Prisma Access Agent deployment by using Strata Cloud Manager to
monitor your Dynamic Privilege Access project activity.
• The Projects table provides an overview of the projects your Dynamic Privilege Access users
access using Prisma Access. Select any project's name to view its details page.
• The project's details page shows:
• Overview—See the maximum allowed users and the peak number of users during the
selected time range for this project.
• IP Pools Utilization—View the number of IP addresses in use and the number of IP
addresses that are still available for the pools in this project.
• Connected Users—View a graph of the users connected during the selected time range.
• Connected Users by Location Group—See the number of users by the Prisma Access
location group they're in.
Strata Cloud Manager Getting Started 156 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Insights: AI Access
Where Can I Use This? What Do I Need?
To learn more about how to secure your sensitive data from GenAI applications, click
here.
Strata Cloud Manager Getting Started 157 ©2025 Palo Alto Networks, Inc.
Insights: Activity Insights
Palo Alto Networks Prisma AIRS is a purpose-built centralized security solution to protect your
organization’s cloud network architecture from AI-specific and conventional network attacks
by leveraging real-time, AI-powered security. It secures your next-generation AI models, AI
applications, and AI datasets from network threats such as prompt injections, sensitive data
leakage, insecure output (for example, malware and URLs), and model DoS attacks.
Use the AI Runtime Security Insights dashboard to understand your cloud network attack surface
and defend your cloud assets against malicious threats.
To learn more about how to secure your AI and non-AI network traffic flow from potential
attacks, see Prisma AIRS documentation.
Strata Cloud Manager Getting Started 158 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Where Can I Use This? What Do I Need?
Strata Cloud Manager provides a set of interactive dashboards that give you a comprehensive
view of the applications, ION devices, threats, users, and security subscriptions at work in
your network. The dashboards provide visibility into the health, security posture, and activity
happening in your deployment that helps you to prevent or address performance and security
gaps in your network. Dashboard support extends across the Palo Alto Networks products
and subscriptions that are supported for cloud management, and from other sources as well,
including Traps, Cortex XDR, Prisma SaaS, and Proofpoint. The data you see often depends on
your subscription. You can review each dashboard topic to see what the license requirements are
for that dashboard, if role permissions might impact what data is visible, and to learn about the
different types of data that each subscription unlocks.
You can access dashboards from the Dashboards menu on the left navigation pane. The SASE
Health dashboard is pinned to the landing page by default. Click More Dashboards and select or
clear the check box beside a dashboard name to pin or unpin the dashboard to the Dashboard
landing page. You can also build your own dashboard using the Build My Dashboard option. Some
of the dashboards also have the option to download and share reports that you can share offline
and schedule for regular updates. To see if reports are supported for a dashboard, check for these
icons:
159
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 160 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 161 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 162 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 163 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 164 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Prisma SD-WAN
No No No Yes Prisma SD-WAN
Per
license Prisma SD-WAN
tenant
Strata Cloud Manager Getting Started 165 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 166 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 167 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Apart from the default dashboards, you can create custom dashboards to get visibility into
areas of your interest in your network using widgets. Widgets are components used to create
a dashboard. Widgets are categorized and stored in the widget library. Click Dashboards > +
and select a category from the drop down list to view the widgets.. The widgets available in
the widget library depend on your security services subscriptions. For example, if you have
AIOps for NGFW Premium and Advanced WildFire licenses, you can view and use all the widgets
under WildFire category to create dashboard.
These are the widget categories available to create a dashboard. Refer to the links below to know
the license requirements to access widgets under these categories and learn about them.
• Dashboard: Advanced Threat Prevention
• Dashboard: DNS Security
• Dashboard: WildFire
Create a Dashboard
You can add up to 10 widgets in a custom dashboard and create 10 custom dashboards per
user. The dashboard and widgets can be customized at any time. You can customize the widget
tile, description, show or hide filters, dashboard settings such as layout, dashboard name, and
descriptions, and also include filters in the dashboard.
Strata Cloud Manager Getting Started 168 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
STEP 4 | Add the widget to the dashboard: Hover over the widget to learn about the widget. Drag and
drop the widget to the dashboard canvas.
You can add more widgets of the same or different types from another widget category to the
dashboard canvas.
STEP 5 | Switch between the Sample Data and Real Data view to know how your dashboard
widget looks. Sample data helps you visualize how your dashboard will look and what type
of information you can see. Use the Real Data option to view the actual data for your
deployment.
STEP 6 | (Optional) You can customize the dashboard in the editor view:
• Rearrange the widgets in the dashboard - select the widget and drag and drop where
required in the canvas.
• Edit a widget using the edit icon at the top-right corner of each widget. Editable settings
vary by widget type — for example, name, description, and data filtering options like verdict
and action.
You can edit the widget settings in the editor view or after you save the dashboard.
STEP 7 | Save the dashboard and click Go to see dashboard at the top of the page to open the
dashboard.
Strata Cloud Manager Getting Started 169 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
You can change the time only after you save the dashboard. In the editor view, the
time range defaults to 24 hours.
• use the edit or delete icon to modify or delete the custom dashboard.
Strata Cloud Manager Getting Started 170 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The Device health dashboard shows you the cumulative health status and performance of
your deployment based on the health scores of the onboarded NGFWs. The device health is
determined by the severity of the health score (0-100) and its corresponding health grade (good,
fair, poor, critical). The health score is calculated based on the priority, quantity, type, and status
of the open alerts.
Strata Cloud Manager Getting Started 171 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Understand the deployment improvements that you have made over a period by looking at the
historical health score data.
• Narrow down devices that require attention in your deployment and prioritize the issues to
resolve them.
The report functionality (download, share, and schedule report) is not supported for this
dashboard.
Strata Cloud Manager Getting Started 172 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Top Unhealthy
These are the devices with most health and performance issues in your deployment. You can also
drill down to view the device details and the alerts on the device. Fix the critical alerts to improve
the health score and deployment health.
Top Improving
View the top 10 devices over the 30 days time period with improved health scores compared to
the current health scores of the devices.
Top Worsening
Review the device health over the 30 days time range. These are the top 10 devices with the
declined health scores compared to the current health scores of the devices.
Strata Cloud Manager Getting Started 173 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The chart shows the health trend of your deployment for the selected time period. Hover over the
trigger point to know the devices that are contributing to the health score severity. You can view
trends for one or more devices filtered by the hostname, model, or software version.
Strata Cloud Manager Getting Started 174 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Executive Summary to get
started.
The Executive Summary dashboard shows you how your Palo Alto Networks security
subscriptions are protecting you. This report breaks down malicious activity in your network
that these subscriptions are detecting: WildFire, Advanced Threat Prevention, Advanced URL
Filtering, and Enterprise DLP. The dashboard shows data for each of these service with links to
security services dashboards to dive deeper for further investigation.
This dashboard supports reports. These icons, in the top right of a dashboard indicate that
reports are supported for this dashboard. You can share, download, and schedule reports that
cover the data this dashboard displays.
Strata Cloud Manager Getting Started 175 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Executive Summary This report gives you the numbers on the malicious activity your
Dashboard: Your Security subscriptions are detecting and preventing:
Subscriptions
• high-risk applications
• severe threats (exploits, malware, and C2)
• malicious web activity
• file-based threats (including never-before-seen threats)
• data loss
Strata Cloud Manager Getting Started 176 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Executive Summary Review the traffic logs for high-risk applications and
Dashboard: Application see how you can strengthen the security posture.
Usage
Executive Summary Examine the security policy rules that allow most threats.
Dashboard: Advanced Review these rules to see where you can enable stricter threat
Threat Prevention enforcement. Learn more.
Requires
Advanced
Threat
Prevention
license.
Requires
Advanced
URL
Filtering
license.
Strata Cloud Manager Getting Started 177 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Peer data in this dashboard gives you a view into your industry’s
threat landscape and how your security coverage compares
to similar organizations. This industry data is also shown for
subscriptions you’re not using; this helps you to see if there are
places where you can increase coverage to close security gaps.
Here’s a close-up of the kind of data this dashboard
provides—here, you can see the work WildFire is doing
to protect your network and your industry. Learn more. ➡
Executive Summary
Dashboard: WildFire
Requires
Advanced
WildFire
license.
Executive Summary See how your Palo Alto Networks Enterprise DLP service is
Dashboard: Enterprise protecting your data by enforcing data security standards. The
DLP dashboard gives insights into the applications to which most
uploads are prevented by DLP and the total number of files that
Requires are blocked by DLP in your network. You can also use this data to
Enterprise compare with your industry peers and benchmark your security
DLP license. posture standards.
Review the applications and source usernames to better
understand where the DLP incidents originated and manage them.
Strata Cloud Manager Getting Started 178 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 179 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Dashboard: WildFire
Where Can I Use This? What Do I Need?
• Click Strata Cloud Manager > Dashboards > More Dashboards > WildFire to get started.
Strata Cloud Manager Getting Started 180 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The WildFire dashboard shows you how WildFire is protecting you from net new malware that’s
concealed in files, and executables. This dashboard supports reports. These icons, in the
top right of a dashboard indicate that reports are supported for this dashboard. You can share,
download, and schedule reports that cover the data this dashboard displays. Before you can
access the Strata Cloud Managerdashboards, you must first activate and onboard as well as
configure your NGFW and/or Prisma Access to forward submission logs to Palo Alto Networks.
The WildFire dashboard provides a variety of filter options to narrow down on specific data from
the dashboard.
Strata Cloud Manager Getting Started 181 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Time range—Set the time-frame for which you want to display data. Select from the Last 24
hours, Past 7 days, Past 30 days, or custom time range.
• Tenant Name—View the tenant for which the dashboard data is displayed.
• Cloud—Filter data based on the available Advanced WildFire cloud regions.
• Sample Source—Filter data based on the devices that are submitting samples to the Advanced
WildFire cloud for analysis. The options include NGFW-All, Prisma Access-All, and Prisma
Access-Mobile.
The quantity of WildFire samples submitted from Prisma Access-All that are visible in
the dashboard is dependent on the version of Prisma Access.
• Sample Type—Filter data based on a specific sample type, either File or Link.
• Total/Unknown—Filter data based on the unknown sample status when initially submitted to
the Advanced WildFire cloud for analysis (previously unknown samples). These also include the
total number of samples that were submitted or queried through the Advanced WildFire cloud.
• File Hash (SHA256)—View the data for samples with SHA-256 values for files analyzed by
Advanced WildFire.
• File Name—Filter data based on the File Name with a user-designated search string.
• Verdict—View samples identified as Benign, Malware, Grayware, C2, Phishing, or Pending as a
result of Advanced WildFire analysis.
• File Type—View data based on the file type of the sample analyzed by WildFire. Learn about
the supported file types for WildFire analysis.
• URL—Filter data based on the URL with a user-designated search string.
• App Name—Filter data based on the samples that are delivered by an application.
• Attack Origin Region—Filter to view the samples that are sent from a specific location.
• Attack Target Region—Filter to view the samples that are received in a specific location.
• User Name—Enter the username to filter data for the user that is targeted to deliver the
sample in your network.
• Prisma Access Location/Branch—Filter samples based on the Prisma Access branch location.
• FW Device Serial Number—Filter the data for the device that submitted the sample for
WildFire analysis.
• Analysis Type—Filter based on the type of Advanced WildFire Analysis that the sample has
undergone.
Strata Cloud Manager Getting Started 182 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
The total number of samples submitted for Advanced WildFire analysis during the selected time
period. The widget shows the number of samples submitted from each source and the verdict
generated for the samples. The widget also shows the spike in the samples submitted for WildFire
analysis. Investigate the spikes in malware samples and take action to mitigate threat impacts on
your network.
Strata Cloud Manager Getting Started 183 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
Get insights into the unique Advanced WildFire samples submitted from your network and
subsequent signatures generated from the analysis. Use the data to understand the new threats
that were observed only in your network in the selected time frame and the number of times your
network has been protected by the signatures generated. Due to the nature of this widget, only
the Time range filter is applicable when adjusting the scope of the presented data.
• Signatures Created by My Org - Percentage of signatures generated from samples unique/first
seen in your environment.
• Signatures Created by Others - Percentage of new signatures created by Advanced WildFire
from all uploaded samples, across the entire spectrum of Palo Alto Networks customers and
other sample sources.
The signature generation data shown in the widget is refreshed every 24 hours by Palo
Alto Networks.
Strata Cloud Manager Getting Started 184 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
Examine the trends for all the samples submitted to Advanced WildFire from your sources and
the verdicts for those samples. Select a verdict count to open all submissions included in the
dashboard settings. You can perform an IOC search on these samples to know the history of the
sample in your network and the global analysis findings of the sample.
Strata Cloud Manager Getting Started 185 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
Learn more about the verdicts for net new samples that Advanced WildFire detected for the first
time in your network. Focus in on the sample types that are most frequently concealing malware.
You can open a list of analyzed samples based the verdict or the WildFire file forwarding category
by clicking on the sample count on the X or Y axis.
Strata Cloud Manager Getting Started 186 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
View recently submitted samples to Advanced WildFire from your sources and the details for
those samples, including the source and destination IP addresses, the file type, and the verdict.
For a more comprehensive backlog of sample submissions, select All Samples. You can perform an
IOC search on any of these samples to access the history of the sample in your network and the
global analysis findings of the sample. Additionally, from the resulting IOC search result, you can
also Download and view the complete WildFire report for the sample.
For a complete listing of available WildFire sample submissions, you can select All Samples
from the Recent Submissions widget.
Strata Cloud Manager Getting Started 187 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
Review the details of the applications that facilitated the delivery of samples into your network
based on the globally selected verdict category.
Strata Cloud Manager Getting Started 188 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
This shows the users who received the most samples in your network based on the globally
selected verdict category.
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
Strata Cloud Manager Getting Started 189 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Review the locations from where the malicious samples originated or that were delivered to in
your network. You can view the sample count for attack origin and target on a map or organized
into a table format. Use this to narrow down regions targeted by malware and type of malware
attack. Due to the nature of this widget, the Verdict filter is not applicable when adjusting the
scope of the presented data.
• Click Dashboards > More Dashboards > WildFire to view the dashboard.
View the Palo Alto Networks NGFWs and Prisma Access tenants that are submitting malicious
samples for Advanced WildFire analysis in order of prevalence. Review the statistics to track
Strata Cloud Manager Getting Started 190 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
down the impacted endpoints and reconfigure the policy rules to mitigate the threats and contain
the malicious files at the source.
Strata Cloud Manager Getting Started 191 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > DNS Security to get started.
The new DNS Security dashboard shows you how your DNS Security subscription is protecting
you from advanced threats and malware that use DNS. You can also filter the information
displayed on the dashboard by time range, action taken, domain, resolver IP, and DNS category.
The source and tenant name for which the data is displayed on the dashboard are shown in the
Tenant Name and Source filters. You can view:DNS request statistics and trends
• Total DNS Requests - Displays the total number of DNS requests that are processed by DNS
Security. The line chart diagrams the number of DNS requests based on the user-defined time
range. Specifying a custom time range updates the line chart accordingly.
• Malicious DNS Requests - Displays a stacked bar graph showing DNS requests that are
categorized as malicious. Click the number link to view the details of the DNS requests.
Strata Cloud Manager Getting Started 192 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Subscription - Displays the number of devices in your network with an active DNS Security
subscription. A percentage of devices that are not equipped with DNS Security or with an
expired subscription is also shown with a link to a complete list.
• High-Risk DNS Category Trends - Examine the trend of high-risk DNS requests according to
DNS category or according to the action taken against them. Hover over a specific flow to
open a popup to show the number of requests or type of action enforced.
Strata Cloud Manager Getting Started 193 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• High-Risk DNS Category Distribution Across Actions- Examine the actions the firewall is
taking against particular high-risk DNS categories.
• Most Accessed Domains - Provides a list of the top 10 most commonly requested domains
from your network along with the DNS category and the action taken. You can view more
details and the relevant logs for a domain. Select View All DNS Requests for a complete list of
domains that have been accessed.
• DNS Resolvers - Monitor malicious and suspicious DNS resolution activity in your network.
View the top DNS resolvers that resolve to malicious domains and the resolvers that are
resolving a suspiciously low number of DNS requests. Click the search icon to view more
Strata Cloud Manager Getting Started 194 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
details on the artifact (IP address). You can view the history of the artifact in your network and
the global analysis findings.
• Users Visiting Malicious Domains- Examine the hosts on your network who are attempting to
resolve the hostname or domain of a malicious URL.
• (Requires Advanced DNS Security license) Hijacked Domains- Provides a list of hijacked
domains as determined by Advanced DNS Security. For each entry, there is a categorization
reason and a traffic hit count based on the source IP.
• (Requires Advanced DNS Security license) Misconfigured Domains- Provides a list of non-
resolvable domains associated with the user specified public-facing parent domain(s). For each
entry, there is a misconfiguration reason and a traffic hit count based on the source IP.
This dashboard supports reports. These icons, in the top right of a dashboard indicate that
reports are supported for this dashboard. You can share, download, and schedule reports that
cover the data this dashboard displays.
Strata Cloud Manager Getting Started 195 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 196 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 197 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 198 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
2. In Security view:
1. You can add an (“+” icon) AI Runtime Security instance to protect the unprotected network
traffic as identified in the operational view.
2. If the AI Runtime Security instance protection already exists, redirect the unprotected traffic
through the available AI Runtime Security instance.
Next, detect the risky network flow paths between the user apps, AI models, and the internet.
See AI Traffic Network Risk Analysis and Deploy an AI Runtime Security instance to monitor and
defend your cloud network architecture.
Strata Cloud Manager Getting Started 199 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Advanced Threat Prevention
to get started.
Strata Cloud Manager Getting Started 200 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 201 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The Advanced Threat Prevention dashboard gives insight into threats detected in your network
and identifies opportunities to strengthen your security posture. Threats are detected using inline
cloud analysis models and threat signatures generated from malicious traffic data collected from
various Palo Alto Networks services. This dashboard provides a timeline view of threats allowed
and blocked and a list of hosts generating cloud-detected C2 traffic and hosts targeted by cloud-
detected exploits.
This dashboard supports reports. These icons, in the top right of a dashboard indicate that
reports are supported for this dashboard. You can share, download, and schedule reports that
cover the data this dashboard displays.
Strata Cloud Manager Getting Started 202 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Advanced Threat Prevention
to view the dashboard.
Compare the delta between the threats that are allowed and blocked by your security rules.
• Click Strata Cloud Manager > Dashboards > More Dashboards > Advanced Threat Prevention
to view the dashboard.
Strata Cloud Manager Getting Started 203 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Examine the threat sessions that matched the security policy rule and see if you need to modify
the policy rule to strengthen your security posture. You can further analyze the threats and
matching rules in Activity Insights.
Column Description
Strata Cloud Manager Getting Started 204 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Advanced Threat Prevention
to view the dashboard.
Examine the source IPs and users responsible for generating command and control (C2) traffic.
Advanced Threat Prevention uses cloud-based engines and inline cloud analysis to detect and
analyze traffic for unknown C2 and vulnerabilities. Click the search icon next to the source IP
to review the usage patterns related to the source IP. A contextual link to Log Viewer helps to
analyze the threat sessions, download the packet capture and cloud report to get additional
context and leverage Palo Alto Networks threat analytics data and improve your incident
response processes.
• Click Strata Cloud Manager > Dashboards > More Dashboards > Advanced Threat Prevention
to view the dashboard.
Strata Cloud Manager Getting Started 205 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
These are the IPs targeted by vulnerability exploits. Advanced Threat Prevention uses cloud-
based engines and inline cloud analysis to detect and analyze this traffic. Hover over the
destination IP address and click the search icon to review the usage patterns related to the
destination IP. View logs to get context around the threat. Download cloud report and packet
capture from the logs to get additional context and use Palo Alto Networks threat analytics data
and threat intelligence to improve your incident response processes.
Strata Cloud Manager Getting Started 206 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
To get started, select Dashboards > More Dashboards > IoT Security.
Strata Cloud Manager Getting Started 207 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
addresses; profile, vendor, model, and OS; and (for advanced IoT Security products) its device-
level risk score.
Use the data in this inventory to learn about the assets on your network:
• View a dynamically generated and up-to-date inventory of the devices detected on your
network, including IoT, OT, and IT devices.
• While the IoT Dashboard displays the types of devices you have at a high level, the Assets
inventory lets you explore individual devices to see more details and assess their security
posture.
• Filter the data displayed in the dashboard by site, device type, period of time, and one or
more device attributes to see data about devices of interest.
• Show and hide columns to view device attributes that are important to you. There are over
100 attribute columns from which to choose.
• Download the data displayed on the currently active page as a file in CSV format for
inclusion in reports or for future reference. The file contains the devices and device
attributes that you have on display at the time of the download.
• Vulnerabilities: The Vulnerability tab lets you customize how information about vulnerabilities
and vulnerability instances is presented so you can view their impact on your devices from
different perspectives. By setting filters, you determine the scope of the information displayed,
and by defining queries and settings, you control the types of vulnerabilities and the types of
devices you want to see.
The Vulnerabilities page lists the vulnerabilities that IoT Security has detected or learned about
through a third-party integration.
You can search for a text string in any of the columns, download the list of vulnerabilities,
create a filter to show only the vulnerabilities you want to see, and control which columns you
want to show and hide.
While a severity level in the IoT Security system reflects a Common Vulnerability Scoring
System (CVSS) score, there isn’t always a direct correlation between the two. IoT Security
bases the severity level not only on the CVSS score but on other determining risk factors as
well. For example, a hard-coded password in a device might have a CVSS score of 10.0, but
an IoT Security severity level of High rather than Critical. This can happen when there isn’t
proof that the device can be accessed from the Internet or by an unauthorized user. While the
National Institute of Standards and Technology (NIST) assigns a CVSS score to a vulnerability
generically, IoT Security assigns a “risk severity” level to vulnerabilities based on the specifics of
each case.
Strata Cloud Manager Getting Started 208 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• See the total number of devices that have been active on your network as determined by the
device type and time filters.
• Of the total number of active devices, see how many are specifically IoT devices.
• Develop a sense of the security landscape in which devices operate by seeing the number of
active alerts and vulnerabilities detected to date.
Devices
• Learn how many devices there are among various device types and drill down to learn how
many devices are among various device categories and then among various device profiles.
Find out how many critical risk devices are at each increasingly granular level of device
classification and what kind of devices they are.
Top 10 Operating Systems
• Of all the devices whose OS IoT Security detected, see the top 10 most common operating
systems, how many devices use each one, and what that percent is.
Subnet Distribution by Device Type
• See how different device types are distributed in subnets throughout the network. If you see
a large mix of device types in the same subnet, consider segmenting them into their own,
separate subnets.
Strata Cloud Manager Getting Started 209 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• One of these:
license
• Click Strata Cloud Manager > Dashboards > More Dashboards > Prisma Access to get started.
Strata Cloud Manager Getting Started 210 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The dashboard shows the aggregated data per Prisma Access tenant.
This dashboard supports reports. These icons, in the top right of a dashboard indicate that
reports are supported for this dashboard. You can share, download, and schedule reports that
cover the data this dashboard displays.
Strata Cloud Manager Getting Started 211 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• license
(with or configuration management)
• Click Strata Cloud Manager > Dashboards > More Dashboards > Application Experience to
get started.
• license
(with or configuration management)
license to view the data for Monitored
Applications
This widget shows you the average of the application segment score for all Mobile Users for all
monitored applications. It also shows you a breakdown of Good, Fair, and Poor experiences by
number of user devices. You can drill down into users experiencing fair or poor performance to
begin investigating. The experience score in this card will give you an indication of the overall
digital experience for the user. For each application that is monitored per mobile user, ADEM
Strata Cloud Manager Getting Started 212 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
calculates a score based on the 5 critical metrics - application availability, DNS resolution time,
TCP connect time, SSL connect time, and the HTTP latency. If the application fails the availability
test (application is unavailable), then the experience score is 0. If the application is reachable,
only then the remaining four metrics will be calculated. Each of the above metrics (other than
application reachability) have a different weightage and baselined lower and upper thresholds,
and their combined weightage equals 100. The sum of these individual metric scores determines
the application experience score for a user. An average of all the test sample results for each
application determines the experience score of a user.
• license
(with or configuration management)
The remote site experience score is an average score of all monitored applications on all
active WAN paths. It is an average of all test sample results that are collected from individual
applications monitored for that remote site. It is the overall experience score (enclosed in a color
coded square) of the remote site or branch, which is an average of experience scores from all the
test samples collected on active paths of all the applications monitored for that site. Although the
experience score of each backup path will be individually calculated and available for each remote
site and application, the experience score for backup paths are not taken into consideration when
calculating the Experience Score of a remote site. You can drill down into sites experiencing fair or
poor performance by clicking on the number next to Fair or Poor.
• license
(with or configuration management)
license to view the data for Monitored
Applications
Strata Cloud Manager Getting Started 213 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
This widget displays a time series graph of average Mobile Users experience of all Mobile Users.
The experience score is calculated and displayed at set intervals during the selected time range.
The y-axis is color coded based on score range to show you the quality of your experience score
(Red = Poor, Yellow = Fair, and Green = Good). Hover your mouse cursor over the trend line to
see the experience score at the time where your cursor is placed.
• license
(with or configuration management)
license to view the data for Monitored
Applications
Identify the segment of the network that might be causing issues within your organization from
the endpoints (for Mobile Users) or branch (Remote Sites) all the way to the applications. You
can see what segment of the network might be causing issues within your organization from the
endpoints and Prisma SD-WAN remote sites all the way to the application. You can see which
segment—such as an ISP or compute location outage or a SaaS app outage—is impacting digital
experience within your organization and also the precise number of users or sites which are
impacted by it. The icons are color coded and based on the average of segment health score for all
Mobile Users. A green icon stands for Good (score is >=70), yellow stands for Fair (score is 30-70),
red stands for Poor (Score<30).
Strata Cloud Manager Getting Started 214 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• license
(with or configuration management)
license to view the data for Monitored
Applications
Depending on the card you select, the map view in this widget shows you the experience of
Prisma Access Locations based on the total number of Mobile Users and applications monitored
or the total number of Remote Sites and applications monitored on specific Prisma Access
Location. The Prisma Access locations are marked with circles that are color coded to represent
the status of application segment scores of all monitored mobile users and remote sites connected
to that specific Prisma Access Location where the circle appears. Hover your mouse cursor over
a circle to see the experience scores for the location, as well as the total number of Mobile User
Devices or Remote Sites monitored and the total number of apps that are monitored for that
location. Multiple locations that are geographically very close to each other are represented by
one circle with a number in it. The number denotes how many locations were grouped in that
area. To see exactly which locations were grouped together, zoom in on the map.
• license
(with or configuration management)
license to view the data for Monitored
Applications
This widget displays one card per application and displays the sites with the highest scores. This
widget shows the remote sites experience score trend during the selected time range. Hover your
mouse cursor over the trend line to see the experience score for that specific point in time.
Strata Cloud Manager Getting Started 215 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• license
(with or configuration management)
license to view the data for Monitored
Applications
Each application card shows you the average application segment score (the number enclosed
in the square) for all monitored Mobile Users for that particular application on the remote site.
The experience score is calculated as an average of App experience scores of all monitored
applications. The experience score depicts the end-to-end experience for the active paths of
the application. It is the average of all test samples collected on the active paths for that specific
application only. The trend line shows you the average of all 5 minute APM data samples for the
selected time frame.
You can see how many applications you are monitoring and also how many active and backup
paths are monitored. Each application card shows the number of paths that are impacted. Click an
application card to see the metrics for that specific app.
• license
(with or configuration management)
license to view the data for Monitored
Applications
Strata Cloud Manager Getting Started 216 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Autonomous DEM uses TCP ping and Curl to determine the end to end Application Performance.
Metric Description
Time to First Byte The total of DNS Lookup, TCP Connect, SSL Connect
and HTTP Latency time results in the Time to First Byte.
Data Transfer Total time taken for the entire data to be transferred.
• license
(with or configuration management)
license to view the data for Monitored
Applications
Strata Cloud Manager Getting Started 217 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Metric Description
Network Latency Time taken to transfer the data over the network.
Strata Cloud Manager Getting Started 218 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Best Practices to get started.
Strata Cloud Manager Getting Started 219 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The best practices dashboard measures your security posture against Palo Alto Networks’ best
practice guidance. Importantly, the best practices assessment includes checks for the Center for
Internet Security’s Critical Security Controls (CSC). CSC checks are called out separately from
other best practice checks, so you can easily pick out and prioritize updates that will bring you up
to CSC compliance.
The best practice dashboard is divided into five sections:
• Summary
Gives you a comprehensive view of all the failed checks for a device across the configuration
types (Security, Network, Identity, and Service Setup), View historical trend charts for BPA
checks and assess your best practice adoption rate for key feature areas.
• Security
Shows the rules, rulebases, or profiles that are failing best practice and CSC checks for the
selected device and location. When available, CLI remediations allow you to resolve issue with
your policy rules. CLI remediations are generated using TSF data you upload when generating
an On-Demand BPA report.
• Rulebases
Looks at how your policy is organized, and whether configuration settings that apply across
many rules align with best practices (including CSC checks).
• Rules
Shows you the rules failing best practice and CSC checks. See where you can take quick
action to fix failed checks. Rules are sorted based on session count, so you can start by
reviewing and updating the rules that are impacting the most traffic.
• Profiles
Shows you how your profiles stack up against best practices, including CSC checks. Profiles
perform advanced inspection for traffic matched to a security or decryption rule.
• Identity
Shows whether the authentication enforcement settings (authentication rule, authentication
profile, and authentication portal) for a device meet the best practices and comply with CSC
checks.
• Network
Checks whether the application override rules and network settings align with best practice
and CSC checks.
• Service Setup
See how the subscriptions you have enabled on your devices are aligning with the best practice
and CSC checks. You can review the WildFire setup, GlobalProtect portal and GlobalProtect
gateway configurations here and fix the failed checks.
Strata Cloud Manager Getting Started 220 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
This dashboard supports reports. These icons, in the top right of a dashboard indicate that
reports are supported for this dashboard. You can share, download, and schedule reports that
cover the data this dashboard displays.
You can download the BPA report for NGFW in either CSV or PDF format. All other BPA
reports are available for download in the PDF format only.
Strata Cloud Manager Getting Started 221 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
You can view a history of changes to the security checks made up to 12 months in the past,
grouped together by the Center for Internet Security (CIS) and the National Institute of Standards
and Technology (NIST) frameworks. For each framework, you’ll see a list of controls as well as the
percentage of current and average compliance rate, total number of best practice checks, and the
number of failed checks for each control.
The dashboard shows the aggregated data for all firewalls onboarded to your tenant and
are also sending telemetry data.
Interact with the chart and the list to see the relationship between controls and their historical
statistics. View details of individual controls and their associated checks, and select a best practice
check to view the firewall configuration that is failing the check.
The CIS Critical Security Controls framework is a prioritized set of recommended actions and best
practices that help protect organizations and their data from known cyberattack vectors. You can
view check summaries for 11 of the 16 basic and foundational CIS controls:
• CSC 3: Continuous Vulnerability Management
• CSC 4: Controlled Use of Administrative Privileges
• CSC 6: Maintenance, Monitoring, and Analysis of Audit Logs
• CSC 7: Email and Web Browser Protections
• CSC 8: Malware Defenses
• CSC 9: Limitation and Control of Network Ports, Protocols, and Services
• CSC 11: Secure configuration for Network Devices, such as Firewalls, Routers, and Switches
• CSC 12: Boundary Defense
• CSC 13: Data Protection
• CSC 14: Controlled Access Based on the Need to Know
• CSC 16: Account Monitoring and Control
The NIST Cybersecurity Framework SP 800-53 Controls framework provides guidance for federal
agencies and other organizations to implement and maintain security and privacy controls for
their information systems. You can view check summaries for eight families of NIST controls:
• SC: Access Control
• AU: Audit and Accountability
Strata Cloud Manager Getting Started 222 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
If you don’t see Compliance Summary among the tab choices, select More Dashboards,
and then select the checkbox for Compliance Summary from the choices listed under
Posture.
Strata Cloud Manager Getting Started 223 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
B) Filter by • Device
• Time-frame
• Past 7 Days
• Past 30 Days
• Past 90 Days
• Past 6 Months
• Past 12 Months
Strata Cloud Manager Getting Started 224 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 225 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Select a control on the list to see the best practice checks it includes.
• Select a best practice check to view the firewall configuration that is failing the check.
Strata Cloud Manager Getting Started 226 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Security Posture Insights to
get started.
Get visibility into the security status and trend of your deployment based on the security postures
of the onboarded NGFW devices. The severity of the security score (0-100) and its corresponding
security grade (good, fair, poor, critical) determine the security posture of a device. The security
score is calculated based on the priority, quantity, type, and status of the open alerts.
Strata Cloud Manager Getting Started 227 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Know the trend of issues that impact the security posture of your deployment.
• Understand the security improvements that you have made in your deployment by looking at
the historical security score data.
• Narrow down devices where there is an opportunity to improve the security posture and
prioritize the issues to resolve them.
The report functionality (download, share, and schedule report) is not supported for this
dashboard.
• Click Strata Cloud Manager > Dashboards > More Dashboards > Security Posture Insights to
view the dashboard.
Strata Cloud Manager Getting Started 228 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Security Posture Insights to
view the dashboard.
Top Unhealthy
These are the top 10 devices most impacting the security posture of your deployment. Drill down
to view the device details and the alerts on the device. Perform the remediation steps for the
critical alerts on the devices to improve the security posture.
Top Improving
View the top 10 devices with improved security posture scores over a 30 days time period,
compared to the current security scores of the devices.
Top Worsening
These are the devices with the declined security posture scores compared to the current security
scores of the devices. Review the alerts on these devices and prioritize to fix them.
Strata Cloud Manager Getting Started 229 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Strata Cloud Manager > Dashboards > More Dashboards > Security Posture Insights to
view the dashboard.
The chart shows the security posture trend of your deployment for the selected time period.
Hover over the trigger point to know the devices and active alerts that are contributing to the
security posture trend. You can view trends for one or more devices filtered by the hostname,
model, or software version.
Strata Cloud Manager Getting Started 230 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > NGFW SD-WAN to get started.
To utilize this dashboard, you can set up a Software-Defined Wide Area Network (SD-WAN) on
Strata Cloud Manager for your Palo Alto Networks Next-Generation Firewalls.
Strata Cloud Manager Getting Started 231 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 232 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
For the selected time duration and VPN cluster, Strata Cloud Manager displays your top 5
impacted applications based on their computed percentage of impacted traffic out of total bytes.
A higher computed percentage indicates a greater impact on the application.
Strata Cloud Manager Getting Started 233 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 234 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 235 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Furthermore, click an application to view its details including traffic and the used links. You can
also click a used link to view its details.
Strata Cloud Manager Getting Started 236 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 237 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Chart shows a trend showing impacted applications in the last 24 hours. Hover your cursor
over the trend line to view impacted applications at a specific point of time.
• Click View Alerts to view the associated alerts that are raised due to the impacted applications.
• The total number of links for the selected time duration and VPN cluster.
• The number of links classified as Critical, Warning, and Good.
• Click the number link for Critical to view the alerts raised due to SD-WAN link performance.
Strata Cloud Manager Getting Started 238 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
For the selected time duration and VPN cluster, Strata Cloud Manager displays your top 5 worst
links based on the computed average of the interface metrics (Tunnel downtime, Latency, Jitter,
and Packet Loss). The links are ranked based on the priority of Tunnel downtime, Latency, Packet
Loss, and Jitter. A higher computed average indicates the poor quality of the links.
Strata Cloud Manager Getting Started 239 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Furthermore, click a link to view its details including charts based on link performance.
Strata Cloud Manager Getting Started 240 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Chart shows a trend showing poor links detected in the last 24 hours. Hover your cursor over
the trend line to view poor links at a specific point of time.
• Click View Alerts to view the associated alerts that are raised due to the poor links.
Strata Cloud Manager Getting Started 241 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
View the number of links, their health, and the impacted applications for every site.
Click the number links under these columns to view details about them.
Strata Cloud Manager Getting Started 242 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
Strata Cloud Manager Getting Started 243 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The Device to Controller Connectivity widget depicts the number of Online and Offline ION
devices connected to the Prisma SD-WAN controller for a Branch and Data Center. Using
this interactive graph, you can view the online or offline status for a claimed device for the
corresponding branch and data center.
On clicking either, Branch or Data Center on the interactive graph, you can view the claimed and
unclaimed devices name, status, software version installed, last activity, and redundancy status of
the device.
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
The Applications widget displays information about the application utilization at the site during
the selected time range. The total application ingress and egress traffic for the time range is
Strata Cloud Manager Getting Started 244 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
displayed. The top 10 applications by traffic volume are displayed along with the other traffic.
Click View All to see the application health distribution, TCP application health distribution over
time, new flows, bandwidth utilization, transaction stats for the selected time range along with the
top applications. You can drill down to view an application's performance and metrics per site for
the selected time range in the dashboard.
The metrics for all TCP applications are initially displayed but, any one of the top 10 TCP
applications can be selected to more narrowly focus on a specific top application.
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
The Top Alerts by Priority widget displays the top 5 alerts by priority. You can see information on
the top branch and data center sites by the number of alerts generated in the selected time range.
You can drill down to view the alert information per site for the selected time range.
Strata Cloud Manager Getting Started 245 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
The Overall Link Quality widget provides an overall snapshot of the current state of links for
all your sites for the selected time range. You can drill down to view the Link Performance, Link
Packet Loss, Link Jitter, and Link Latency and allows you to analyze information you want to view
in greater detail in the Link Quality Metrics dashboard.
Strata Cloud Manager Getting Started 246 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
The Bandwidth Utilization widget displays the amount of bandwidth utilized on a trail in a
network. It is a visual representation of bandwidth spike, total bandwidth consumed by a
particular site, and the application; if the upload is in ingress, egress direction or both.
Move your cursor in the Bandwidth Utilization chart to get a more granular view of the
bandwidth utilization with an application or time-stamp. Typically, the apps are listed in order of
their bandwidth utilization. The chart displays the bandwidth consumed over time. The 1H view
provides granular per minute data, and the 1D picture shows data every 5 minutes. The 1D chart
data averages above 5 minutes for each sample. If utilization sustains above 5 minutes, you can
see the corresponding peak utilization in both charts.
Strata Cloud Manager Getting Started 247 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
You can use the download option from the widget to download the Bandwidth Utilization chart in
either PDF, CSV, XLS, or PNG formats.
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
The Transaction Stats widget provides transaction statistics on TCP flows, including initiation/
transaction successes and failures for a specific application or all applications, a particular path
or all paths, and all health events. It measures the performance and availability of networks
and applications that run on network paths. For each request on a given path, Prisma SD-WAN
monitors, in real-time, the transaction error rates for initiation and data transfer transactions.
From the Transaction Stats chart, view the list of Apps by their bandwidth utilization or by path.
You can filter out successful transactions to get a granular view of transaction failure stats. The
chart displays the count of successful or failed transactions for the following categories:
• Init Sucessful: Successful completion of the three-way handshake.
• TXNs Sucessful: Successful transfer of data after the completion of the three-way handshake.
• Init Failure: Failure to complete the three-way handshake. Reasons for failure may include
a misconfiguration firewall, an application server issue, a misconfiguration network access
control list, or a WAN network provider issue.
Strata Cloud Manager Getting Started 248 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• TXNs Failure: Unsuccessful transfer of data after the completion of the three-way handshake.
Reasons for failure can include a mis-configured firewall, an application server issue, a mis-
configured network access control list, or a WAN network provider issue.
You can use the download option from the widget to download the Bandwidth Utilization chart in
either PDF, CSV, XLS, or PNG formats.
• license
The other licenses and prerequisites needed
for visibility are:
Licenses to unlock certain widgets in the
dashboard
WAN Clarity for predictive analysis
A role that has permission to view the
dashboard
Strata Logging Service
→ The features and capabilities available to
you in depend on which license(s) you are
using.
The Predictive Analytics widget provides insight into the health of sites and applications and
proactive monitoring to identify critical issues and troubleshoot them faster, thus enhancing
service levels. It identifies critical sites, links, and applications and categorizes them as Good,
Fair, and Poor at the tenant level, based on the AI/ML health scores. The widget includes
predicting capacity utilization at the branch site level based on the previous three to six months of
information.
Strata Cloud Manager Getting Started 249 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The default time range to view the metrics is three hours; however, you can adjust it to shorter
or longer periods depending on the desired scope of information. Gain insights into the top 10
sites whose bandwidth utilization increased in the previous 28 days; you can view seven days
prediction whenever 28 days prediction is unavailable and predict the future branch capacity
utilization.
Click View All to gain insights on Branch Sites, Applications, Links, Network Insights, Top Sites
with Traffic Volume Growth in Past 30 days, and Site Capacity Prediction And Anomaly.
Strata Cloud Manager Getting Started 250 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• Click Dashboards > More Dashboards > PAN-OS CVEs to get started.
The PAN-OS CVEs dashboard shows you the number of devices impacted by a specific
vulnerability based on the features that have been enabled on devices. Strata Cloud Manager
analyzes the features that have been enabled to determine the devices impacted by the CVE.
Strata Cloud Manager Getting Started 251 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
After you understand the vulnerabilities for impacted devices, you can plan your patching using
the Upgrade Recommendations feature. Expand the CVEs and select firewalls that you want
to upgrade to fix the vulnerabilities, and click Generate Upgrade Recommendations. You are
redirected to NGFW - Upgrade Recommendations to view the generated report.
Here is how to assess vulnerabilities that impact devices and generate upgrade recommendation
to fix the vulnerabilities.
Strata Cloud Manager Getting Started 252 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 253 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The CDSS Adoption dashboard shows the recommended Cloud-Delivered Security Services
(CDSS) subscriptions and their usage in your devices. This helps you to identify security gaps and
harden the security posture of your enterprise. After you navigate to this page, you will see a pop-
up asking you to confirm or update your zone roles in NGFWs to get accurate security services
recommendations. You can follow the link in this pop-up window to map zones to roles.
Strata Cloud Manager Getting Started 254 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• You can click one of the values under ACTIVATE, CONFIGURE, or BEST PRACTICES to view
details in a tabular format.
Strata Cloud Manager Getting Started 255 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 256 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
In this example, AIOps for NGFW recommends the activation of Advanced URL Filtering
(ADV-URL) along with Advanced Threat Protection (ATP), Domain Name System (DNS), and
WildFire (WF) security services for NGFWs. You can click Back to Graph View to navigate to
the Overview page.
• You can also view the same security posture data in a pie chart format. Click the pie-chart icon
to view the information about recommended security services in a pie-chart format.
Strata Cloud Manager Getting Started 257 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• You can click the sections of the pie-chart to view the information about the individual security
service.
In this example, to view the NGFW where DNS Security is not configured, you can either click
the value above the DNS Security section of a pie chart or click the DNS Security section of a
pie chart.
Strata Cloud Manager Getting Started 258 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 259 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
In this example, AIOps for NGFW recommends the configuration of Advanced URL Filtering
(ADV-URL) along with other security services for a device. You can cancel the ADV-URL security
service for the NGFW device and all the zones under it.
Strata Cloud Manager Getting Started 260 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 261 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
You can also override the recommended security service at a zone level. View Details for an
NGFW to view the source and destination roles, policies, and their recommended security
services.
Strata Cloud Manager Getting Started 262 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 263 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
In this example, you can override the ADV-URL security service for the source role as Third
Party Vendor and the destination role as Unknown. You can also restore the overridden
recommendation by clicking on the security service under the Overrides column.
You can View Policies associated with roles. Select a rule to view its details without needing to
leave the app.
Strata Cloud Manager Getting Started 264 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Click Back to Table View to view the security services in a tabular format.
Strata Cloud Manager Getting Started 265 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The Feature Adoption dashboard shows you the security features that you are using in your
deployment, and you can use it to identify gaps in adoption. This helps you make sure that you are
getting the most out of your Palo Alto Networks security subscriptions and firewall features.
Strata Cloud Manager Getting Started 266 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Strata Cloud Manager Getting Started 267 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• When you generate an On-Demand BPA report using a TSF, adoption information
from your TSF is reflected on the Feature Adoption dashboard. (PAN-OS 9.1 and
above TSFs)
• You can export adoption data in .csv format for use in third-party applications such
as Microsoft Excel
Select the section for a feature on the chart to view which policy rules lack that feature.
Strata Cloud Manager Getting Started 268 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Select a rule to view its details without needing to leave the app.
Strata Cloud Manager Getting Started 269 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Apply WildFire Analysis, Antivirus, Anti-Spyware, Vulnerability, and File Blocking profiles to
all rules that allow traffic, with a target of 100% or almost 100% adoption. If you don’t apply a
profile to an allow rule, ensure that there is a good business reason not to apply the profile.
Configuring security profiles on all allow rules enables the firewall to inspect decrypted traffic
for threats, regardless of application or service/port. After updating the configuration, you can
run the BPA for non-telemetry devices to measure progress and to catch new rules that don’t
have security profiles attached.
You can apply WildFire profiles to rules without a WildFire license. Coverage is limited
to PE files, but this still provides useful visibility into unknown malicious files.
In the Anti-Spyware profile, apply DNS Sinkhole to all rules to prevent compromised internal
hosts from sending DNS queries for malicious and custom domains, to identify and track the
potentially compromised hosts, and to avoid gaps in DNS inspection. Enabling DNS Sinkhole
protects your network without affecting availability, so you can and should enable it right
away.
Apply URL Filtering and Credential Theft (phishing) Protection to all outbound internet traffic.
In the Adoption Summary’s Apps, Users, Ports summary, check the adoption rates of the following
capabilities. Use the recommendations as gap identification criteria—if the actual adoption rate
doesn’t match the recommendations, plan to close the gap:
Strata Cloud Manager Getting Started 270 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
Apply App-ID to as close to 100% of the rules as possible. Apply User-ID to all rules with
source zones or address ranges that have a user presence (some zones may not have user
sources; for example, sources in data center zones should be servers and not users). Leverage
App-ID and User-ID to create policies that allow appropriate users to sanctioned (and
tolerated) applications. Explicitly block malicious and unwanted applications.
Target 100% or close to 100% service/port adoption—don’t allow applications on non-standard
ports unless there’s a good business reason for it.
In the Adoption Summary’s Logging summary, check the adoption rates of the following
capabilities. Use the recommendations as gap identification criteria—if the actual adoption rate
doesn’t match the recommendations, plan to close the gap:
Target at or close to 100% adoption for Logging and Log Forwarding.
Configure Zone protection profiles on all zones.
In summary:
User-ID All rules with source zones or address ranges that have a
user presence
Strata Cloud Manager Getting Started 271 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
You can now run the Best Practice Assessment (BPA) and Feature Adoption summary directly
from Strata Cloud Manager. Just upload a TSF file. You can generate the on-demand BPA report
for devices that are not sending telemetry data or onboarded to AIOps for NGFW.
Strata Cloud Manager Getting Started 272 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
applications, users, and content are on your network. Additionally, best practices include checks
for the Center for Internet Security’s Critical Security Controls (CSC). See the best practices
guidance to bolster security posture and implement improvements.
Strata Cloud Manager Getting Started 273 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The upload time is dependent on the size of your .tgz file and your Internet speed. Uploading
the file could take a few minutes for larger files. Expand In-Progress to view the status of the
TSF files.
• On-demand BPA supports only the TSF files in the .tgz file format.
• On-demand BPA supports TSFs from devices with the PAN-OS version 9.1 or above
for report generation.
• For information about Palo Alto Networks' data capturing, processing, and
telemetry storage, see AIOps for NGFW Privacy in the Trust Center.
Strata Cloud Manager Getting Started 274 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• • One of these:
and ADEM Observability
• • One of these:
and ADEM Observability
Strata Cloud Manager Getting Started 275 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The Current Mobile Users tab in the SASE Health dashboard shows you an overview of
the breakdown of Mobile User experience across all locations. The number in the circles
correspond to the number of Mobile Users who are currently connected to Prisma Access using
GlobalProtect. A dot represents a single Mobile User. A green circle or dot indicates Good
user experience score. Likewise, a red one indicates a degraded experience score. Degraded
experience scores comprise of Fair and Poor scores combined. The line chart to the right of
Current Mobile Users shows you a trend of the average experience scores for all Mobile Users
during the selected Time Range.
Click the number (representing the potentially degraded-experience user count) next to the
Potential Degraded Experience or Incidents to see the details of the degraded user experience in
a pane that opens on the left.
• • One of these:
and ADEM Observability
The SASE Health dashboard provides a unified view of the SD-WAN and third-party sites
connected to the Prisma Access remote network location. It displays a map view of sites and data
centers connected to Prisma Access Remote Networks and provides detailed metrics of on-site
Strata Cloud Manager Getting Started 276 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
connectivity and experience scores across networks. This enables you to monitor the status of
your remote sites and data centers.
This dashboard shows the number of configured sites connecting to Prisma Access Locations
worldwide. The number enclosed in parenthesis is the total number of connected sites and the
number to the right is the number of sites that are up with Good experience scores. Sites are
considered based on score for SD-WAN or tunnel status and incidents.
The blue line chart indicates the trend of average experience score for all sites over time. Below
the Current Sites you see the number of sites with degraded (Poor) experience score along with
the number of Incidents for all sites.
Use the detailed metrics and trend charts in the dashboard to monitor the health of distributed
sites and quickly troubleshoot any connectivity or performance issues by drilling down into
specific sites or regions. You can filter the data by Sites only, Sites and Data Centers, or Sites and
Prisma Access Locations.
If you have Juniper Mist integrated third-party sites, you will see Juniper Mist sites in the
dashboard. To know more about the integration, refer to Juniper Mist Integration.
To view the dashboard, navigate to Dashboards > SASE Health, select Current Sites on the page.
Drill down to a specific site to know the site details such as the PA location, DC connected to,
standard VPN, secure fabric, and any open incidents.
Degraded Site Experience displays the data by Incidents and Segments. Incidents, for SD-WAN
and Juniper Mist, are categorized into Infrastructure, network services, data centers, and third-
party sites. You can further drill down to a specific incident by selecting the incident you want to
investigate.
Strata Cloud Manager Getting Started 277 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
If you have ADEM enabled, you can view Site trend. Click the Experience Trends & Network
Topology icon to view a time series, followed by the end-to-end topology chart for Prisma SASE
sites.
Strata Cloud Manager Getting Started 278 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
• • One of these:
and ADEM Observability
See the application availability metrics in the Monitored Applications tab of the SASE Health
dashboard. This dashboard shows you how many applications are monitored through ADEM
and how many of them are experiencing a degraded score. This number takes into consideration
the application experience for both Mobile Users and Remote Sites. Applications with Poor or
Fair application experience scores are considered as degraded experience. You can also see the
application's availability during the time range you select using the filter.
Strata Cloud Manager Getting Started 279 ©2025 Palo Alto Networks, Inc.
Dashboards: Strata Cloud Manager
The number to the right of the application name tells you the percentage of time during the Time
Range that the application was available.
Strata Cloud Manager Getting Started 280 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Where Can I Use This? What Do I Need?
Get comprehensive visibility across your network traffic, and the products and subscriptions
you're managing with Strata Cloud Manager. You can protectively monitor the health and
connectivity status of your remote networks, applications, NGFW devices, and mobile users in
Prisma Access. Strata Cloud Manager also provides features to monitor the performance of the
common network services, consumption details of your subscription licenses, and manage the
tool used to analyze connectivity issues. The Prisma SD-WAN users can also monitor the health
and connectivity status of Prisma SD-WAN applications, ION devices, data centers here all in one
place.
281
Monitor: Strata Cloud Manager
You can search on a security artifact to interact with data just for that artifact. Search results
include:
• The artifact’s history and activity in your network. Using this data, you can assess how
prevalent the artifact is in your network and compare to Palo Alto Networks global data.
• Palo Alto Networks threat intelligence on the artifact, based on analysis data of all traffic
processed by Palo Alto Networks.
• Passive DNS data that is used to populate the Passive DNS History widget (for URL and
domain searches) is generated based on user data from telemetry collected by the firewall.
Click Monitor > IOC Search to get started.
Strata Cloud Manager Getting Started 282 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
To get started, search for one of these types of artifacts: a file hash (SHA-256), a URL, a domain,
or an IP address (IPv4 or IPv6).
IP Address
You can search for an IP address (IPv4 and IPv6) to analyze the threat information related to IP
address activities in your network. The following data is displayed in the search result:
• Total number of times an IP address was detected and allowed into in your network over the
past 30 days.
• Graphical representation of global telemetry counts.
• Associated threat actors, malware Campaigns, vulnerabilities, techniques, in the form of tags
associated with the IOC.
IP Address Overview—View general information about the IP address, including the verdict,
associated tags, and, if the IP address has been analyzed previously, the timestamp when it was
initially and last observed, globally.
Strata Cloud Manager Getting Started 283 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Evidence in Your Network—Learn about detection reasons with timestamps when it was
initially and last observed in your network, unique allowed users, and total hits data for the web
request.
IP Address History {in Your Network | Globally}—Shows the number of times the IP address
was accessed by various endpoints in your network (or globally, depending on the widget
setting) during the past 30 days.
Globally:
In Your Network:
Passive DNS History —Review the passive DNS history of DNS traffic records associated with
the IP address. That can allow you to examine how domains have been resolved in the past,
track changes in DNS configurations, and identify potentially malicious activities.
You can configure the fields displayed in the passive DNS history table based on the following
fields:
Strata Cloud Manager Getting Started 284 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Whois Information —Displays general domain information based on the resource's publicly
available registration details.
Domain
View a summary of the activities associated with the domain in your network. The search results
include:
• Classification of the domain in your network based on analysis data from URL Filtering and
DNS Security.
• Total number of activities associated with the domain over a specified duration, both in your
network and globally.
• Enforcement applied to each activity in a graphical format.
• DNS activity collected from across all WildFire submissions that contain instances of this
domain.
Strata Cloud Manager Getting Started 285 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
The IOC Search does not currently support visualization of local network activity seen by
the Advanced DNS Security Resolver.
Domain Overview—View general information about the domain, including the domain and
URL categories as determined by the Advanced DNS Security and Advanced URL Filtering
services, respectively, the category tags, and, if the IP address has been analyzed previously,
the timestamp when it was initially and last observed, globally.
Evidence in Your Network—Learn about detection reasons with timestamps when it was
initially and last observed in your network, unique allowed users, and total hits data for the web
request.
Domain History {in Your Network | Globally}—Shows the number of times the domain was
accessed by endpoints in your network (or globally, depending on the widget setting) during
the past 30 days.
Globally:
Strata Cloud Manager Getting Started 286 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
In Your Network:
Passive DNS History —Review the passive DNS history of DNS traffic records associated with
the domain. That can allow you to examine how domains have been resolved in the past, track
changes in DNS configurations, and identify potentially malicious activities.
You can configure the fields displayed in the passive DNS history table based on the following
fields:
• ➡—Indicates the number of the passive DNS entry.
• Request—The domain name that was queried.
• Response—The domain response type.
• Count—Number of times the domain was accessed from your network.
• Type—The DNS query record type. For example, "A" (for IPv4), "AAAA" (for IPv6), "MX" (for
mail servers), "NS" (for name servers), "TXT" (for text records), and "CNAME" (for DNS
records that store information about the domain's CNAME alias history).
• First Seen—Indicates when the DNS records were first observed.
• Last Seen—Indicates when the DNS records were last observed.
Strata Cloud Manager Getting Started 287 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Whois Information —Displays general domain information based on the resource's publicly
available registration details.
URL
Learn about the URL’s activity across all traffic Palo Alto Networks analyzes. The search results
include:
URL Overview—View general information about the URL, including the domain and URL
categories as determined by the Advanced DNS Security and Advanced URL Filtering services,
respectively, the category tags, and, if the IP address has been analyzed previously, the
timestamp when it was initially and last observed, globally.
Strata Cloud Manager Getting Started 288 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Evidence in Your Network—Learn about detection reasons with timestamps when it was
initially and last observed in your network, unique allowed users, and total hits data for the web
request.
URL History {in Your Network | Globally}—Shows the number of times the URL was accessed
by endpoints in your network (or globally, depending on the widget setting) during the past 30
days.
Globally:
In Your Network:
Strata Cloud Manager Getting Started 289 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Passive DNS History —Review the passive DNS history of DNS traffic records associated with
the URL. That can allow you to examine how domains have been resolved in the past, track
changes in DNS configurations, and identify potentially malicious activities.
You can configure the fields displayed in the passive DNS history table based on the following
fields:
• ➡—Indicates the number of the passive DNS entry.
• Request—The domain name that was queried.
• Response—The domain response type.
• Count—Number of times the domain was accessed from your network.
• Type—The DNS query record type. For example, "A" (for IPv4), "AAAA" (for IPv6), "MX" (for
mail servers), "NS" (for name servers), "TXT" (for text records), and "CNAME" (for DNS
records that store information about the domain's CNAME alias history).
• First Seen—Indicates when the DNS records were first observed.
• Last Seen—Indicates when the DNS records were last observed.
Whois Information —Displays general URL information based on the resource's publicly
available registration details.
Strata Cloud Manager Getting Started 290 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
File Hash
File hash search summarizes the file details in a report based on data generated during WildFire
analysis. You can download the report as a PDF or MAEC file in cases where the sample is
determined to be malicious, phishing, grayware, or benign. Unknown samples do not generate a
report.
WildFire samples that generate a verdict provide file information and session information at a
minimum; while samples that have undergone additional analysis produce specific analysis data
that is relevant to actions taken by the sample. You can drill down on the search results to review
the following information categories:
File Information—View general file information, including the file hash, size, and type, as
categorized by WildFire. You can also the see the verdict of the sample here. Alternatively, you
can search directly on VirusTotal for additional information about suspicious files, domains,
URLs, IP addresses using the supplied hash value. If the verdict is classified incorrectly, request
for a verdict change. The Palo Alto Networks threat team investigates further on the sample
and updates the verdict if found incorrect.
You can also download the WildFire report of the selected sample hash as a PDF or MAEC file.
Evidence in Your Network—Learn about detection reasons, as provided by WildFire, for the
given file hash with timestamps when it was initially and last observed in your network, unique
allowed users, and total hits data for the web request.
Strata Cloud Manager Getting Started 291 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
SHA-256 History in Your Network—View the historical prevalence of the specified file hash in
your network, and globally, based on the allow and block actions taken by the NGFW.
Session Information—Learn about the network session for a sample. Use this data to learn
more about the context of the threat, know the affected hosts and clients, and the applications
used to deliver the malware.
Static Analysis—Static analysis looks at the contents of a specific file before the file is executed
in the WildFire analysis environment. This also shows the suspicious file properties, processes,
and behaviors detected during static analysis. The search result varies depending on the file
type.
Strata Cloud Manager Getting Started 292 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Actions Monitored —Review various sample process activity details that WildFire recorded
during sample analysis.
Strata Cloud Manager Getting Started 293 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 294 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 295 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• The List view shows you how many sites were active during the Time Range selected and the
overall health metrics of the branch sites.
• The Activity view presents key application analytics, the latest site health score and site health
distribution over time.
• Prisma Access
• Prisma SD-WAN
Baselines in Widgets
If you purchased the AI-Powered ADEM license, you see a baseline data band across the trend
widgets on the following Monitor pages: Users, Branch Sites, Data Centers, and Network Services.
The widgets show the baseline in the background across the trend lines. This allows you to view
at a glance whether your data has crossed the upper or lower boundaries of the baseline.
Baseline data is calculated in 1-hour bin sizes and takes into consideration the last 28 days of data
from those hour-long bins for a particular tunnel, site, Prisma Access location, or GlobalProtect
user count. For example, the baseline from 1:00 pm to 2:00 pm on Tuesday is calculated from
the 1:00 pm to 2:00 pm time frame on the previous four Tuesdays. The lower bound is the 10th
percentile of that historical data collected, and the upper bound is its 90th percentile. This allows
you to see trends for bandwidth, user counts, authentication counts, and DNS Proxy request and
response. Because the baseline data is taken from the last 28 days of historical data, the newly
Strata Cloud Manager Getting Started 296 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
onboarded tenants will need to be up and data rich for 28 days for the baseline to be calculated
correctly. If your data is less than 28 days, you may see some discrepancies.
When the values in the trend line in the widget deviate from the baseline's upper or lower limits,
the trend line for that period appears in red in the web interface.
The following example shows the GlobalProtect baseline from the Connected User widget on the
Users page.
Sites by Status
View your Remote Networks Sites by Status. You can see how many sites are Up, Down, Inactive,
or Not Available, and how many sites have a Warning during the selected Time Range.
Bandwidth Consumption
Bandwidth Consumption shows the highest peak bandwidth consumed at a compute region
across all of the tenant's compute regions in the aggregate bandwidth allocation model. The
highest peak bandwidth consumed by a site across all sites is shown for the per-site bandwidth
allocation model. The peak values are computed for the selected time filter duration.
Select View Consumption by Compute Region to view consumption values and trend charts for
all compute regions and their configured IPSec termination nodes.
View Consumption by Compute Regions
Navigate to Monitor > Branch Sites > Prisma AccessInsights > Branch Sites > Prisma Access.
When using the Aggregate Bandwidth Allocation model, select View Consumption by Compute
Regions in the Bandwidth Consumption widget to see bandwidth consumption and trends for
your regions. The Compute Regions page shows bandwidth consumption data during the Time
Range you select. You can view a table with your Compute Regions' Average Bandwidth, Median
Bandwidth, and Peak Bandwidth.
The Bandwidth Consumption Trend by Compute Region graph shows data about your Compute
Region. Filter the data to refine the information you want to view.
Strata Cloud Manager Getting Started 297 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• Select Cumulative (Ingress + Egress), Ingress, Egress, or Ingress vs. Egress from the drop-
down.
• View the Peak, Median, or Average bandwidth consumption trend during the selected time
range. The default setting is Peak bandwidth consumption.
Strata Cloud Manager Getting Started 298 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 299 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• View the Peak, Median, or Average bandwidth consumption trend during the selected time
range. The default setting is Peak bandwidth consumption.
• Log Scale or Linear Scale.
• Compute Region—View Compute Regions with a breakdown of sites terminating in the region
when the tenant uses the Aggregate Bandwidth Allocation model. For each Compute Region,
select the sites terminating in the Compute Region to view their bandwidth consumption trend.
• Branch Sites—Select a minimum of 1 site and a maximum of 10 sites to view their trend lines
on the graph during the selected time range.
Strata Cloud Manager Getting Started 300 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 301 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• You can attain true high availability by being able to specify different regions for redundancy.
You can view both high-performance and legacy branches in your environment. In Strata Cloud
Manager, go to Monitor > Branch Sites > Prisma AccessInsights > Branch Sites > Prisma Access,
and from the Prisma Access Sites table, select a branch site.
Prisma Access Site Details
Select any Prisma Access Site Name to view its Site Status, where you can see its Connectivity
and BGP Status (Up, Down, Inactive, or Not Available). View the bandwidth Peak Consumption
for the selected time interval.
You can view Cumulative (Ingress + Egress) information in the Bandwidth Consumption Trend
chart.
• Use the drop-down to view the bandwidth consumption chart by Ingress, Egress, Ingress Vs.
Egress, or Cumulative (Ingress + Egress).
• View the Bandwidth Consumption Trend chart metrics by Peak (default), Average, or Median
for the branch site.
Strata Cloud Manager Getting Started 302 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 303 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
View this branch's Bandwidth Consumption Trend for the last 30 days.
Tunnels
See how many tunnels there are for this site, and view each tunnel's details. To download tunnels
data, select the Download icon.
• Tunnel Name—The tunnel's unique name.
Strata Cloud Manager Getting Started 304 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• Prisma Access Location—The Prisma Access location for this remote network.
• Tunnel Status—Up, Down, Init, or Unavailable.
• Tunnel BGP Status—Up, Down, or Unknown.
• Tunnel Monitoring—If you have enabled Tunnel Monitoring, this column shows whether it's
Up or Down. If you haven't enabled it, this column shows Not Configured.
• Average Throughput—The average bandwidth for the tunnel for the selected time range.
• Peak Throughput—The peak bandwidth for the tunnel for the selected time range.
• Source IP Address—The source IP address.
• Destination Endpoint Address—IP or FQDN address for Prisma Access to determine whether
the tunnel is up.
• Disconnections—Number of disconnections during the selected time range.
• Disconnections Duration—How long, in seconds, the tunnel is disconnected during the
selected time range.
Select a Tunnel Name to see its Tunnel Status, Bandwidth Consumption Trend, and other tunnel
details.
Tunnels in High-Performance Branch Sites
The Tunnels table for RN-HP branches shows two different Prisma Access Locations for Active
and Backup tunnels. You can have as many as eight tunnels in your environment—four Active
and four Backup. The Tunnels table includes a column for Destination Endpoint Address. RN-HP
branches always show an FQDN specification.
Tunnel Trends
With Tunnel Monitoring enabled, you can select a number of tunnels and view their median
Round-Trip Time. If you don’t specify a set of tunnels, by default the median RTT is computed for
the 10 tunnels with the highest observed RTT.
Aggregated Tunnel Connectivity shows you the total number of connected tunnels for the
selected time range. Hover over either graph to see the number of connections at a specific time.
Commits Pushed shows how many commits were pushed during the selected Time Range and
when the Last Push Commit occurred.
Strata Cloud Manager Getting Started 305 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Site Status
Site Status shows site availability during the time range selected. Green means the site was up
during this time, red means the site was down, and gray means no data was available during the
time shown.
Strata Cloud Manager Getting Started 306 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
24 hours, seven days, 30 days, and 90 days and the interval is one minute, five minutes, one
hour, and one day, respectively.
• Site Connectivity Health Distribution: The distribution of Good, Fair, and Poor sites graph
for a given tenant based on the latest site connectivity health distribution.
• Site Connectivity Health Distribution Over Time: The time series graph of the health score
running devices software 5.6.1 or higher.
• Site Application Experience Score: The site application experience score.
• Prisma SD-WAN Branch Sites: View the site health, site connectivity health, circuit health,
secure fabric health, and the approaching capacity threshold of a branch site. You can
further drill down and filter a branch site by site prediction, alarm status, and ADEM status.
• The Activity view presents key application analytics, the latest site health score and site health
distribution over time. These include:
• Site Health Distribution: displays the distribution of Good, Fair, and Poor sites graph for a
given tenant based on the latest site health score.
• Site Health Distribution Over Time: displays the time series graph of site health distribution
over time for a given tenant based on the health score for a branch site.
• Bandwidth Utilization: displays bandwidth utilization of each application on a site and WAN
path, with data on the top ten apps that consume the most bandwidth in the network.
• Transaction Stats: displays transaction statistics on TCP flows, including initiation/
transaction successes and failures for a specific application or all applications, a particular
path or all paths, and all health events.
• New Flows: displays new TCP and UDP flows for an application, a specific set of
applications, or all applications for a given period.
• Concurrent Flows: helps you understand how many connections are active on your network
by application.
Strata Cloud Manager Getting Started 307 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Monitor how the service connections, ZTNA connectors, and site connectivity are performing in
and Prisma SD-WAN data centers. Select the Monitor > Prisma Access > Data Centers > Service
Connections or ZTNA Connectors tab to view the health and status of the service connections
and ZTNA connectors in Prisma Access.
For each Prisma SD-WAN data center, select Monitor > Data Centers > Prisma SD-WAN to view
the site connectivity information and the status of the VPN overlay connections.
• Service Connections
• ZTNA Connectors
• Prisma SD-WAN
Service Connections
See aggregated service connections data as well as information about individual service
connections. Beyond providing access to corporate resources, service connections allow your
mobile users to reach branch locations. You can view your service connections in Strata Cloud
Manager to see service connection status, bandwidth consumption trends, tunnel data and trends,
and information about overall service connection health. Select Monitor > Data Centers > Service
Connections to get started.
Strata Cloud Manager Getting Started 308 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Bandwidth Consumption shows the highest peak bandwidth consumed by a site across all sites
for the per-site bandwidth allocation model. The peak values are computed for the selected time
filter duration.
Baselines in Widgets
Strata Cloud Manager Getting Started 309 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
If you purchased the AI-Powered ADEM license, you see a baseline data band across the trend
widgets on the following Monitor pages: Users, Branch Sites, Data Centers, and Network Services.
The widgets show the baseline in the background across the trend lines. This allows you to view
at a glance whether your data has crossed the upper or lower boundaries of the baseline.
Baseline data is calculated in 1-hour bin sizes and takes into consideration the last 28 days of data
from those hour-long bins for a particular tunnel, site, Prisma Access location, or GlobalProtect
user count. For example, the baseline from 1:00 pm to 2:00 pm on Tuesday is calculated from
the 1:00 pm to 2:00 pm time frame on the previous four Tuesdays. The lower bound is the 10th
percentile of that historical data collected, and the upper bound is its 90th percentile. This allows
you to see trends for bandwidth, user counts, authentication counts, and DNS Proxy request and
response. Because the baseline data is taken from the last 28 days of historical data, the newly
onboarded tenants will need to be up and data rich for 28 days for the baseline to be calculated
correctly. If your data is less than 28 days, you may see some discrepancies.
When the values in the trend line in the widget deviate from the baseline's upper or lower limits,
the trend line for that period appears in red in the web interface.
The following example shows the GlobalProtect baseline from the Connected User widget on the
Users page.
Strata Cloud Manager Getting Started 310 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• Service Status—This field indicates the status of the instance or firewall to which the site is
connected. The status can be Up, Down, or Unknown.
• Prisma Access Location—The service connection's Prisma Access location.
• Average Bandwidth Consumption—Average bandwidth consumption in Kbps.
• Peak Bandwidth Consumption—Peak bandwidth consumption in Kbps.
Strata Cloud Manager Getting Started 311 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 312 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• View the Bandwidth Consumption Trend chart metrics by Peak (default), Average, or Median
for the branch site.
Strata Cloud Manager Getting Started 313 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Tunnels
See how many Tunnels there are for this service connection, and view each tunnel's details. To
download Tunnels data, select the Download icon.
Tunnel Trends
You can select a number of tunnels and view their median Round-Trip Time. If you don’t specify a
set of tunnels, the median RTT is computed for the 10 tunnels with the highest observed RTT.
Aggregated Tunnel Connectivity shows you the total number of connected tunnels for the
selected time range. Hover over either graph to see the number of connections at a specific time.
Commits Pushed shows how many commits have been pushed during the selected Time Range
and when the Last Push Commit occurred.
Strata Cloud Manager Getting Started 314 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Site Status
Site Status shows site availability during the time range selected. Green means the site was up
during this time, red means the site was down, and gray means no data was available during the
time shown.
Health
Health shows you the Site Status, and it shows the name and status of each tunnel in the site.
Connectivity
Connectivity shows the Prisma Access location the site is connected to, its source and destination
IPs, and the Prisma Access node status.
Strata Cloud Manager Getting Started 315 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Consumption
Consumption shows bandwidth consumption details.
ZTNA Connectors
The Zero Trust Network Access (ZTNA) Connector simplifies private application access for all
your applications. The ZTNA Connector VM in your environment automatically forms tunnels
between your private applications and Prisma Access. View a summary of all configured ZTNA
connectors, including the Application Targets associated with the connector, its average and
median bandwidth, and the Status (Up, Partially Up, or Down). Select Monitor > Data Centers
> ZTNA Connectors in Strata Cloud Manager to see how your ZTNA connectors and connector
groups are performing.
Strata Cloud Manager Getting Started 316 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 317 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
each access object. By viewing this information, you can get an overall picture of the health and
connectivity of your deployment.
The private apps in the data centers connect to Prisma Access through your Connector virtual
machines (VMs). You can add apps based on these access objects—FQDNs, FQDN wildcards, or IP
subnets.
• FQDNs—Prisma Access resolves the FQDNs of the applications you onboard to ZTNA
Connector to the IP addresses in the Application IP address block.
• Wildcards—For wildcard-based apps, create an FQDN-based connector group, then specify the
wildcard to use (for example, *.example.com) for the app target. When users access sites that
match the wildcard, those apps are automatically onboarded for access from ZTNA Connector
for your mobile users and remote network users.
• IP Subnets—Create an IP subnet-based Connector group, and then enter the IP subnet to use
for the app target.
• View a graph of the Total ZTNA Access Objects in your environment by Status, which means
the automated secure tunnels for the access object are Up, Partially Up, Down, or Disabled.
Strata Cloud Manager Getting Started 318 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
If the status is down, the connector associated with this access object can't reach your
application.
• Up—All tunnels are up.
• Partially Up—Some tunnels are up and others are down or disabled.
• Down—All tunnels are down.
• Disabled—All tunnels are disabled.
Select a status color square in the Total ZTNA Access Objects widget to sort access objects by
Status in the ZTNA Access Objects table.
• Total Wildcards and Total IP Subnets summarizes how many IP Subnets and Wildcard rules
you've onboarded. This is the number of wildcard rules that you created, which is a different
total than the number of apps discovered as a result of creating these rules.
Strata Cloud Manager Getting Started 319 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• ZTNA Access Objects provides information about all of your access objects.
• Access Object—Select a specific access object to view its details.
• Status—The automated secure tunnel for the access object is Up, Partially Up, Down, or
Disabled.
• FQDN/IP Subnet—The FQDN or IP subnet used to add this access object.
• Fabric IP (If Applicable)—The fabric IP associated with this access object.
• Connector Groups—Connector Groups are logical groupings of connectors and applications.
View the Connector Groups associated with an access object.
• Connectors—Connectors represent the VMs running in your data centers that connect to
Prisma Access. View the Connectors associated with an access object.
Strata Cloud Manager Getting Started 320 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Wildcards
Select Wildcards to see your wildcard access objects. View Total Wildcards by status and the
number of Total Wildcards and Total IP Subnets.
Strata Cloud Manager Getting Started 321 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Select the arrow next to a wildcard or select View Details for information about the access
objects that make up this wildcard.
• Access Object—Select a specific access object to view its details.
• Status—The automated secure tunnel for the access object is Up, Partially Up, Down, or
Disabled.
• FQDN/IP Subnet—The FQDN or IP subnet used to add this access object.
• Fabric IP (If Applicable)—The fabric IP associated with this access object.
• Connector Groups—Connector Groups are logical groupings of connectors and applications.
View the Connector Groups associated with an access object.
• Connectors—Connectors represent the VMs running in your data centers that connect to
Prisma Access. View the Connectors associated with an access object.
Strata Cloud Manager Getting Started 322 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
IP Subnets
Select IP Subnets to see your total of IP subnet access objects. One IP subnet access object
consists of a grouping of several different apps.
View Total IP Subnets in your environment by Status (Up, Partially Up, Down, or Disabled).
IP Subnet ZTNA Access Objects provides information about all of your access objects.
• • Access Object—Select a specific access object to view its details.
• Status—Up, Partially Up, Down, or Disabled.
• IP Subnet—The IP subnet used to add this access object.
• Connector Groups—Connector Groups are logical groupings of connectors and applications.
View the connector groups associated with an access object.
• Connectors—Connectors represent the VMs running in your data centers that connect to
Prisma Access. View the connectors associated with an access object.
Strata Cloud Manager Getting Started 323 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 324 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
From the Monitor > Network Services page, you can view the performance of common network
services that affect your user experience for accessing applications. Select the GlobalProtect
Authentication tab to view the authentication success or failure counts for GlobalProtect for
different locations. Select Network Services: DNS to see DNS Proxy requests and responses
received across tenants with respect to Prisma Access DNS Proxy.
• GlobalProtect Authentication
• DNS
GlobalProtect Authentication
You can see the performance of common network services that affect your user experience
for accessing applications. Network services include reporting the number of GlobalProtect
authentication successes and failures as a measure of mobile users being able to connect to
Prisma Access and displays of DNS proxy requests and responses forwarded to servers during a
time range you specify. Select Monitor > Network Services > GlobalProtect Authentication to get
started.
• Set the Time Range filter to review network services data for that time range.
• Specify a Prisma Access Location to view its authentication success, total failures, and timeout
failures in the time range selected.
Strata Cloud Manager Getting Started 325 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
The data represents how many mobile users at a given time are trying to authenticate to a
GlobalProtect portal, which then sends the mobile users’ credentials for verification to an on-
premises active directory (AD) server, resulting in an authentication success or failure. If you see
a large number of authentication failures, you can correlate the failures with a network event
that indicates a problem with a certain location or an on-premises authentication server that
was down. The data in these charts provide troubleshooting insights for network administrators
who resolve network issues. You can view the count of authentication success or failure
trends for mobile users at GlobalProtect portals and gateways, use this data to learn about the
patterns of authentication successes or failures over time, and establish count ranges that can be
normal or anomalous in your Prisma Access deployment. For example, anomalous counts could
indicate existing users’ inability to connect to Prisma Access because to availability issues with
GlobalProtect portals or slow authentication servers. Or, anomalous counts might represent large
numbers of users onboarded to the customer’s network all at once.
Strata Cloud Manager Getting Started 326 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
DNS
Select Monitor > Network Services > DNS to get started.
Network Services: DNS displays DNS Proxy requests and responses. You can use the following
filters:
• Time Range
• DNS Proxy Names
DNS Proxy filter values are related to the last 30 days and are automatically selected when you
load (that is, if there is no Explicit Proxy data, then there is no Explicit Proxy filter). For more
detailed information, see View and Monitor Network Services.
Requests Sent
View network requests and queries forwarded to servers over the time range you specify. Hover
your cursor over any point in the graph to see information about the requests sent to the DNS
proxy servers at that time. If you selected a proxy name on which to filter, you see the data for
that proxy.
Strata Cloud Manager Getting Started 327 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Responses Received
View the total responses received across tenants during the time range you specify. Hover your
cursor over any point in the graph to see information about the responses received at that time. If
you selected a proxy name on which to filter, you see the data for that proxy.
Baselines in Widgets
If you purchased the AI-Powered ADEM license, you see a baseline data band across the trend
widgets on the following Monitor pages: Users, Branch Sites, Data Centers, and Network Services.
The widgets show the baseline in the background across the trend lines. This allows you to view
at a glance whether your data has crossed the upper or lower boundaries of the baseline.
Baseline data is calculated in 1-hour bin sizes and takes into consideration the last 28 days of data
from those hour-long bins for a particular tunnel, site, Prisma Access location, or GlobalProtect
user count. For example, the baseline from 1:00 pm to 2:00 pm on Tuesday is calculated from
the 1:00 pm to 2:00 pm time frame on the previous four Tuesdays. The lower bound is the 10th
percentile of that historical data collected, and the upper bound is its 90th percentile. This allows
you to see trends for bandwidth, user counts, authentication counts, and DNS Proxy request and
response. Because the baseline data is taken from the last 28 days of historical data, the newly
onboarded tenants will need to be up and data rich for 28 days for the baseline to be calculated
correctly. If your data is less than 28 days, you may see some discrepancies.
When the values in the trend line in the widget deviate from the baseline's upper or lower limits,
the trend line for that period appears in red in the web interface.
The following example shows the GlobalProtect baseline from the Connected User widget on the
Users page.
Strata Cloud Manager Getting Started 328 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• license
(with or configuration management)
Select Monitor > Subscription Usage to view details about your Prisma Access Base Subscription
usage, including the total number of unique users connected, bandwidth consumed by remote
network users, the total number of service connections deployed, and details about any add-on
subscriptions.
• Total Data Transfer— Monitor your usage against your licensed data transfer limit, providing
you with a visual representation of your tenant-level data usage for Mobile Users, Remote
Networks, and combination licenses over a 12-month period starting from your license
activation date.
• Mobile Users—View how many unique Mobile Users licenses you have consumed so far. The
widget displays the total number of licenses consumed by unique Mobile Users connected in
the last 30 days. License usage is based on the previous 30 days of login data. A user who has
logged in at least once in the previous 30 days through one of these three connection methods
—Global Protect Agent, Prisma Access Agent, or Agentless (or Explicit Proxy)—contributes
toward consumption of one Mobile User license. If a user connects through multiple connect
Strata Cloud Manager Getting Started 329 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
methods—say, Global Protect Agent and Explicit Proxy—in the previous 30 days, the user is
reflected in both GlobalProtect Connected Users and Explicit Proxy Active Users counts but is
counted only once for Total Unique Users count.
Select View Usage Detail to see details about license use during the past 30 days. You
can view the total number of unique users during the past 30 days, the total GlobalProtect
connected users, and the total Explicit Proxy active users. Hover over the graph to see the
licenses consumed at that time.
• Branch Sites—See the total bandwidth usage by all Remote Networks connected to Prisma
Access. View how much bandwidth you have allocated and how much you have consumed,
in Mbps. You see usage by total bandwidth consumed by all Remote Networks connected to
Prisma Access.
Select View Usage Detail to see your licensed bandwidth consumption by Compute Regions or
branch sites based on your Bandwidth Allocation Model. In each case, a daily peak bandwidth
consumption value is indicated for each of the 30 days considered for the license computation.
You can filter the graph view by selecting Compute Regions or branch sites. There are three
lines plotted per Compute Region or per site in the chart indicating daily peak consumption
values, the allocated bandwidth to the Compute Region or site, and the 95th percentile value
obtained from the daily peaks.
• Service Connections—See how many Service Connections licenses you have consumed so far.
See the Add-On Subscriptions section on this page to see the additional licenses that you
have purchased. You can see the total number of licenses purchased as well as the number of
unconsumed licenses so far. The following images describe some of the additional licenses you
can purchase.
Strata Cloud Manager Getting Started 330 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• Prisma Access Browser—Prisma Access Secure Enterprise Browser (Prisma Access Browser)
is the only solution that secures both managed and unmanaged devices through a natively
integrated enterprise browser that extends protection to unmanaged devices. Prisma Access
Browser protects business apps and data by placing security in the browser. Your Prisma
Access Browser subscription appears in the Add-on Subscriptions or Prisma Access Base
Subscriptions.
• Prisma Access Base Subscriptions—The tenant has a Prisma Access Browser standalone
license.
• Add-on Subscriptions—When you have purchased the Prisma Access Browser license for all
mobile users, the Prisma Access Browser subscription is Activated.
See the Add-on Subscriptions section on this page to see the additional licenses that you have
purchased, such as the Autonomous Digital Experience Management licenses for Mobile Users
and Remote Networks. You can see the total number of licenses purchased as well as the
number of unconsumed licenses so far. View Application Tests for Mobile User Monitoring - the
number of application tests left that you can create for your Mobile Users. Application tests are
determined by the number of Monitored Mobile Users with up to 10 app tests allowed per Mobile
User.
For more information, see View and Monitor Subscription Usage.
Strata Cloud Manager Getting Started 331 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• license
→ The features and capabilities available to
you in depend on which license(s) you are
using.
ION Devices in Prisma SD-WAN enable you to combine disparate WAN networks, such as; MPLS,
LTE, and internet links, into a single, high-performance, hybrid wide area network (WAN).
The Device List screen provides information on the list of Prisma SD-WAN devices including the
software version and status of the ION device, where you can upgrade the device’s software
version or configure a device.
Entity Description
The Device Activity screen displays various device activity reports for a site in the last 24 hours.
Strata Cloud Manager Getting Started 332 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• license
(with or configuration management)
Select Monitor > Access Analyzer to start a new Access Analyzer query and view a table of
existing queries.
The Access Analyzer provides automatic monitoring of your SASE environment. It offers a
conversational AI tool for contextual troubleshooting and what-if analysis to analyze access and
connectivity issues in your SASE environment.
You can:
• Learn how to create a natural language query in Access Analyzer.
• Start a new Access Analyzer query.
• View a list of existing queries, and select any query from the table to view further details.
Strata Cloud Manager Getting Started 333 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• NGFWs or
(with or configuration management) Software NGFW Credits
(for VM-Series software NGFWs)
In Monitor > NGFW Devices, you can get a color-coded, interactive representation of the devices
in your deployment for easy and intuitive management and investigation.
STEP 1 | Select Monitor > NGFW Devices.
Strata Cloud Manager Getting Started 334 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
STEP 3 | Select which attribute you would like the visualization to be Grouped by.
The Device Group and Template Stack grouping options are only available in
Panorama-managed deployments where Panorama is sending device telemetry.
STEP 4 | Select a group to view the devices in it, and select a device to view general information
about it.
If you want to learn more about a device, select it.
Strata Cloud Manager Getting Started 335 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 336 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Alert Timeline
A timeline of device alerts and commit events.
Alerts are categorized as Critical, Warning, or
Commit Events. Toggle to view the alert data
in table format.
Strata Cloud Manager Getting Started 337 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 338 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• or
→ The features and capabilities available to
you in depend on which license(s) you are
using.
Capacity Analyzer allows you to analyze and monitor your devices' resource capacity by keeping
track of their metrics usage based on their model types. Capacity Analyzer provides the following
benefits:
• A comprehensive understanding of the existing metric utilization and the unutilized metric
capacity up to the maximum limit.
• A heatmap visualization that showcases metrics usage with respect to the hardware platforms
in a single view and helps drill-down into details.
• The ability to plan for upgrading to higher capacity firewalls based on your specific needs.
The Capacity Analyzer feature is not supported for the VM-Series firewalls.
Here’s a video that shows how to use the Capacity Analyzer feature:
Capacity Analyzer is enhanced to support alerts that help you to anticipate resource consumption
nearing its maximum capacity and trigger timely notifications. The Capacity Analyzer alerts are
generated three months in advance identifying potential capacity bottlenecks. This helps you
to plan configuration cleanup or upsize NGFW capacities before they hit maximum usage and
maintain system stability. See Premium Health Alerts for the list of supported Capacity alerts.
Capacity Analyzer supports the following metrics:
Strata Cloud Manager Getting Started 339 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 340 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
The heatmap shows metrics usage for every device. The darker color represents a higher
utilization and the lighter color indicates a lower utilization. By default, the Multicolor View is
selected. You can switch to the Monochrome View as well.
Here are the different ways in which you can use the Capacity Analyzer heatmap to obtain
information about metric usage:
Strata Cloud Manager Getting Started 341 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• Hover your cursor on a metric block for a device to view a tooltip that provides the following
details:
• Name of the metric
• Device model and list of devices
• Device capacity range
Strata Cloud Manager Getting Started 342 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
• license
(with or configuration management)
Select Monitor > Prisma Access Locations to get started. From here, you can view the health
of all your Prisma Access locations for your remote networks and mobile users. For a detailed
description of these widgets, see View and Monitor Prisma Access Locations in the Prisma Access
Administration Guide.
Strata Cloud Manager Getting Started 343 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 344 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Monitor: Assets
Where Can I Use This? What Do I Need?
• NGFWs subscription
(with or configuration management) Software NGFW Credits
(for VM-Series software NGFWs)
To get started, select Monitor > Assets. From here, you can see a dynamically maintained
inventory of the IoT, OT, and IT devices on your network with numerous attributes for each one
such as its IP and MAC addresses; profile, vendor, model, and OS; and (for advanced IoT Security
products) its device-level risk score.
Use the data in this inventory to learn about the assets on your network:
• View a dynamically generated and up-to-date inventory of the devices detected on your
network, including IoT, OT, and IT devices.
• While the IoT Dashboard displays the types of devices you have at a high level, the Assets
inventory lets you explore individual devices to see more details and assess their security
posture.
• Filter the data displayed in the dashboard by site, device type, period of time, and one or more
device attributes to see data about devices of interest.
• Show and hide columns to view device attributes that are important to you. There are over 100
attribute columns from which to choose.
• Download the data displayed on the currently active page as a file in CSV format for inclusion
in reports or for future reference. The file contains the devices and device attributes that you
have on display at the time of the download.
Strata Cloud Manager Getting Started 345 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
You can use the Cloud Identity Engine with Prisma Access to apply information from third-party
IoT detection sources to simplify the task of identifying and closing security gaps for devices in
your network. See Configure Third-Party Device-ID in Prisma Access for details about setup and
configuration.
Go to Monitor > Devices > IOT to get insights on your IoT devices, such as the number of IoT
devices connected within the last 30 minutes, all IoT devices connected during the time range
selected, and details about all connected IoT devices.
Strata Cloud Manager Getting Started 346 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Hover over a point in the chart to see the number of users at a specific time. Knowing the user
trends over a specific period of time can help you monitor usage and investigate any unusual
patterns.
IoT Devices
View the number of IoT devices connected during the selected Time Range. Use the column drop-
down to select or deselect the columns that appear in the table.
Strata Cloud Manager Getting Started 347 ©2025 Palo Alto Networks, Inc.
Monitor: Strata Cloud Manager
Strata Cloud Manager Getting Started 348 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud
Manager
Where Can I Use This? What Do I Need?
Strata Cloud Manager gives you a common framework for interacting and investigating the
incidents and alerts that Palo Alto Networks products and subscriptions detect in your enterprise:
• Incidents and Alerts: NGFW
• Incidents and Alerts: Prisma Access
• Incidents and Alerts: Prisma SD-WAN
To help you maintain the ongoing health of your devices and deployments, and to avoid
disruption to your business, explore each of the incidents and alerts pages to:
• View incidents and alerts across your network, and drill down to investigate.
• Create and review rules that trigger incident and alert notifications.
You can move between your incidents and alerts and the Incidents and Alerts: Log Viewer to
investigate activity on your network that's triggering or is associated with incidents and alerts.
349
Incidents and Alerts: Strata Cloud Manager
Strata Cloud Manager Getting Started 350 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
To help you maintain the ongoing health of your devices and avoid incidents that disrupt your
business, your applications generate incidents and alerts based on one or more issues that it has
detected with your firewall deployment. With Incidents & Alerts > NGFW, you get a singular view
of your incidents and alerts across NGFWs.
Here’s how to get up and running with NGFW Incidents & Alerts:
• Incidents keep you informed about vulnerabilities. You can investigate them and take
preventive actions if necessary.
Navigate to Incidents & Alerts > NGFW > All Incidents to view incidents across your network,
and interact with them.
• An alert indicates a specific problem (degradation or loss of firewall functionality) that needs to
be addressed. Alerts can also be generated based on correlation or aggregation across multiple
Strata Cloud Manager Getting Started 351 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
events. This aggregation of events into a single alert helps triage, streamline alert hand-off
between teams, centralize critical information, and reduce notification fatigue.
Navigate to Incidents & Alerts > NGFW > All Alerts to view alerts across your network, and
interact with them.
Strata Cloud Manager Getting Started 352 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
Select Incidents & Alerts > Prisma Access to get started. The Incidents and Alerts available in your
environment depend on your licenses.
The Incidents & Alerts > Prisma Access page does not support custom roles.
Get an Overview
See an Overview of Incidents and Alerts information related to your Prisma Access environment.
The Incidents and Alerts available in your environment depend on your licenses.
Strata Cloud Manager Getting Started 353 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
Notification Profiles
From Notification Profiles, you can view information about Notification Subscriptions and create
a new or modify an existing Notification Profile.
Incident Settings
From Incident Settings, you can customize the incidents you receive by Incident category and
Incident code.
Strata Cloud Manager Getting Started 354 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
• license
→ The features and capabilities available to
you in depend on which license(s) you are
using.
Prisma SD-WAN generates incidents and alerts when the system reaches system-defined or
customer-defined thresholds or there is a fault in the system. Use these incidents and alerts to
troubleshoot the system.
Select Incidents and Alerts > Prisma SD-WAN to view incidents and alerts in
Strata Cloud Manager.
Use the following tabs to navigate through incidents and alerts in Prisma SD-WAN.
• Overview
• Incidents
• Alerts
• Settings
Overview
View incidents and alerts and their categories in Prisma SD-WAN. The Overview tab is your
default view.
View the top incidents and alerts which display the following information.
Strata Cloud Manager Getting Started 355 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
Incidents
An incident is an indication of a fault in the system. Incidents are raised and cleared and vary in
severity:
• Critical—Whole or part of a network is down and requires immediate action.
• Warning—Impacts the network and needs immediate attention.
• Informational—Network is degraded and needs attention soon.
Alerts
An alert may or may not be an indication of a fault in the network. An alert is raised when the
system reaches system-defined or customer-defined thresholds.
Settings
Use the Settings tab to create incident policies to manage event code suppression based on the
specified classifications and action attributes configured. You can use incident policy rules to
suppress or escalate incidents that arise during a scheduled time period. In addition, you can also
change the default priority of system generated incidents to a priority level that is more aligned
with your business requirements.
Strata Cloud Manager Getting Started 356 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
Log Viewer provides the capabilities of Explore — where you can view and interact with your logs
stored in Strata Logging Service.
Log Viewer provides an audit trail for system, configuration, and network events. Jump from
a dashboard to your logs to get details and investigate findings. A query field and time range
preferences help you narrow down the specific logs that are of interest to you.
• Learn more about how to build your queries
• Discover new Log Viewer features in the Strata Logging Servicerelease notes.
Log Viewer highlights actions and severity of the logs to help you understand how sessions are
enforced. You can also view the details of the security artifacts of the logs in Search page.
Select the log type you want to view. For details on the log types and definition of each of their
log fields, see the Log Reference guide.
Strata Cloud Manager Getting Started 357 ©2025 Palo Alto Networks, Inc.
Incidents and Alerts: Strata Cloud Manager
• To define notification preferences, such as which alerts trigger notifications, how you receive
notifications, and how often you receive them, create a notification rule.
Navigate to Incidents & Alerts > Incident & Alert Settings > Notification Rules to view and add
rules to trigger notifications.
• Strata Cloud Manager generates alerts and incidents that dynamically adjust based on the
metric’s historical value and your usage trends. You can adjust this setting to control the
sensitivity level of the anomaly detection algorithm.
Navigate to Incidents & Alerts > Incident & Alert Settings > Anomaly Sensitivity to configure
the sensitivity level of the anomaly detection algorithm.
Strata Cloud Manager Getting Started 358 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma
Access
Where Can I Use This? What Do I Need?
Strata Cloud Manager enables you to configure a security policy that is shared across your
NGFWs and Prisma Access.
Set up Prisma Access, your NGFWs, or both with Strata Cloud Manager
Set up folders to group NGFWs that require similar settings. Prisma Access folders are
predefined, and enable you to target configuration based on deployment type: mobile users,
remote networks, service connections.
Set the Manage: Configuration Scope you want to work in. You can configure settings that will
apply globally, across both your NGFWs and Prisma Access environment, and can also target
configuration to specific NGFWs or Prisma Access deployments based on folders.
Use Manage: Snippets to standardize a common base configuration for a set of NGFWs or
deployments. Snippets enable you to quickly onboard new devices, users, or locations with a
known good configuration and reduce the time required to onboard a new device.
Go to Manage > Configuration > NGFW and Prisma Access to start creating your security
policy, and sharing it across your NGFWs and Prisma Access using the management features
described above.
Start building the following your Security policy rules and share it across your NGFWs and
Prisma Access using the management features described above.
359
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 360 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
With Strata Cloud Manager, you can apply configuration settings and enforce policy globally
across your entire environment, or target settings and policy to certain parts of your organization.
When working in your Strata Cloud Manager configuration management, the current
Configuration Scope is always visible to you, and you can toggle your view to manage a broader
or more granular configuration.
You can get clarity on the configuration elements that are applicable for a particular Configuration
Scope and whether they are inherited from a common Configuration Scope or generated by the
system. The color-coded configuration indicators help you understand where the configurations
are inherited from, and also visually distinguish the object types for easy scanning.
• Grey dot indicates inherited configuration
• Purple dot indicates a predefined configuration
• Blue dot indicates that the object is present in the current configuration scope
Global configuration settings help you to easily manage and enforce policy requirements that
apply across all your network traffic. Alternatively, you can target policy and configuration
settings to the types of deployments where they make sense.
Strata Cloud Manager Getting Started 361 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• Prisma Access
• Mobile Users Container– Settings apply across all mobile user connection types:
GlobalProtect and Explicit Proxy, or individually to each connection type.
• Remote Networks– Settings apply to remote network sites (branch offices, retail locations,
etc.).
• Service Connections– Settings apply to service connection sites (HQ and data centers).
• All Firewalls– Settings apply across all your NGFWs, or to specific folders that group together
NGFWs that require shared or specific configuration settings or policy enforcement.
Learn more about:
• Workflows: Folder Management
Use folders to logically group your devices and deployment types for simplified configuration
management.
• Manage: Snippets
Use snippets to group configurations that you can quickly push to your firewalls or
deployments.
• Manage: Variables
Use variables your configurations to accommodate device or deployment-specific
configuration objects.
Strata Cloud Manager Getting Started 362 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Manage: Snippets
Where Can I Use This? What Do I Need?
Strata Cloud Manager Getting Started 363 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Use snippets to group configurations that you can quickly push to your firewalls or deployments.
A snippet is a configuration object, which can't fit into a hierarchy, or grouping of configuration
objects, that you can associate with a folder, deployment, or device. Snippets are used to
standardize a common base configuration for a set of firewalls or deployments allowing you to
quickly onboard new devices with a known good configuration and reducing the time required
to onboard a new device. For example, you can onboard a new firewall in a remote branch
office. You can associate a set of snippets that contain all of the required network and policy rule
configurations with the folder the new firewall belongs to. This reduces the time required to set
up the firewall to protect the remote branch office.
Snippet associations have a top-down priority in the event of conflicting object values. Rules with
duplicate names are not allowed, and validation fails during the creation of a snippet with the
same name in any folder or while associating a snippet to a folder if the snippet with the same
name is already associated.
This means that if the first and the last associated snippets have different values for the same
object, the value from the first snippet is inherited by the device or deployment. Additionally,
all configurations inherited from a snippet can be overridden at the child folder, deployment, or
device level.
Within a folder hierarchy, a snippet might only be associated one time within any folder hierarchy.
This means that a snippet can’t be associated with both a folder and the folder nested under
it. However, you can associate the same snippet with different folders or folders nested under
different folders. Snippets that are already associated with a folder in the folder hierarchy are
grayed out so they can’t be used more than once where applicable.
Strata Cloud Manager Getting Started 364 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Snippet Classification
• Predefined: All Strata Cloud Manager users can access these snippets to quickly set up new
firewalls and deployments with best practice configurations.
• Local: These editable snippets are created within the tenant and can't share them with other
subscriber tenants.
• Published: Trusted subscriber tenants have access to these shared snippets, which can't be
cloned or edited.
Strata Cloud Manager Getting Started 365 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• Subscribed: These snippets, shared by the publisher tenant, can be cloned by users but can't be
edited.
Create a Snippet
Create and associate a snippet with a folder, deployment, or device to apply a common
base configuration to a group of devices. You can associate as many snippets with a folder,
deployment, or device as needed.
Snippets can be modified and reassociated with any folder, deployment, or device at any time
after creation.
Strata Cloud Manager Getting Started 366 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Overview and expand the
Configuration Scope to view the Snippets.
Strata Cloud Manager Getting Started 367 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 368 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
3. Click the Tenant Name link to edit subscriber tenant properties for shared snippets,
controlling snippet management during disassociation.
Strata Cloud Manager Getting Started 369 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 370 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 6 | To delete a subscribed snippet, select the Tenant Name and Delete Subscriber.
The deleted subscriber tenant will be removed and will not appear under Subscribed.
Strata Cloud Manager Getting Started 371 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Modify a Snippet
Modify your snippet configurations, details, and associations.
Custom snippets no longer associated with a folder, deployment, or device can be deleted.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Overview and expand the
Configuration Scope to view the Snippets.
STEP 4 | (Optional) Edit the snippet to modify the Name, Description, or to change or assign
additional Labels. Enable or disable Pause Update to see the configuration diffs and decide
to accept the change.
Strata Cloud Manager Getting Started 372 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 5 | Edit the Snippet Associations to reassociate the snippet with a different folder, deployment,
or device or to associate the snippet with additional folders, deployments, or devices.
Exit the snippet reassociation screen to apply the changes.
Delete a Snippet
Delete your custom snippets to keep your configurations organized. Snippets must be
unassociated with any firewalls, folders, or deployments before they are able to be deleted.
Deleting predefined snippets is not supported.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Overview and expand the
Configuration Scope to view the Snippets.
STEP 3 | Click the three vertical dots of the custom snippet you want to delete.
Strata Cloud Manager Getting Started 373 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Clone a Snippet
If you want to use an existing snippet as a template for a new snippet, you can easily clone it so
you do not have to configure a new object.
Cloned snippets are not associated with any devices, folders, or deployments, allowing you to
customize them freely without having to disassociate them before you begin your configurations.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Overview and expand the
Configuration Scope to view the Snippets.
STEP 3 | Click the three vertical dots of the custom snippet you want to clone.
STEP 2 | On the publisher tenant, select Manage > Configuration > NGFW and Prisma Access >
Overview, select the Global configuration scope.
Strata Cloud Manager Getting Started 374 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 3 | Establish Trust Between the Tenants: Establish a connection between the subscriber and
publisher tenants to enable the sharing of snippets.
1. Click Subscriber Tenant under Trusted Tenants for Snippet Sharing.
3. Enter the TSG ID to add as a subscriber tenant, and Check TSG ID. This ensures prevention
of randomly generated TSG or serialized TSG-based attacks.
Upon successful validation, a confirmation message indicates that the TSD ID has been
verified.
Strata Cloud Manager Getting Started 375 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 4 | Go to subscriber tenant, select Manage > Configuration > NGFW and Prisma Access >
Overview and set the configuration scope to Global.
1. The Publisher Tenants status under Trusted Tenants for Snippet Sharing shows as Pending.
2. Click Publisher Tenants and Enter Pre Shared Key generated in the previous step, and
Validate the subscriber tenant.
After successful validation, a message confirms the tenant as trusted, establishing trust
between the subscriber and publisher tenants.
Strata Cloud Manager Getting Started 376 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 377 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Subscribed snippets associated with folders or firewalls can only be cloned and can't be
deleted.
Manage: Variables
Where Can I Use This? What Do I Need?
Strata Cloud Manager Getting Started 378 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
push configuration changes while using fewer snippets to accommodate device or deployment-
specific configuration values.
Variables can be created at the folder, deployment, or firewall level. When you create a variable
for a folder, the variable is inherited by all folders nested under the folder. In the event of
conflicting variables in a folder Configuration Scope, the firewall or deployment inherits the
variable value from the folder containing the nested folders. However, you can override an
inherited variable at the nested folder, deployment, or firewall level.
The following types of variables are supported:
Device Priority Device priority to indicate a preference for which firewall should assume
the active role in an active/passive high availability (HA) configuration.
Egress Max Egress max value to use in Quality of Service (QoS) Profile configuration.
Rate Rate to specify a threshold that triggers an action. For example, the Alarm
rate for a DoS Protection profile.
Router ID Router ID when you configure Border Gateway Protocol (BGP) for a logical
router.
Strata Cloud Manager Getting Started 379 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Create a Variable
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Overview and select the
Configuration Scope where you want to create the variable.
In the Folders, select the folder or device for which you want to create a variable.
In the Snippets, select the specific snippet for which you want to create a variable.
Strata Cloud Manager Getting Started 380 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 381 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Import a Variable
Import variables to Strata Cloud Manager using a CSV file. Variable imports are designed to
overwrite multiple variables inherited from the folder hierarchy by the firewall, or already
configured in the firewall Configuration Scope, with new firewall-specific values.
The variable must already be inherited from the folder hierarchy or configured in the firewall
Configuration Scope to overwrite using variable imports. Importing variables to create entirely
new variables isn’t supported.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Overview.
STEP 4 | Select CSV Export/Import > Export to export the variables you want to overwrite.
Palo Alto Networks recommends you first export the variables you want to overwrite. This
guarantees the CSV file you upload to Strata Cloud Manager is properly formatted. This also
expedites the import process by ensuring the target folder and firewall variables are properly
attributed.
Strata Cloud Manager Getting Started 382 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 383 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
by the firewall from the folder hierarchy, or configured in the firewall Configuration Scope,
in order to be overridden using variable import.
• A variable value of None# or None means that the variable was created with the variable
Value as None.
You can modify any variable value as None to remove the value but not delete the variable.
• For a variable created in the firewall Configuration scope, deleting a variable value and
leaving it blank deletes the variable.
For a variable created in the folder hierarchy and inherited by the firewall, deleting a
variable value and leaving it blank reverts the variable value to that inherited from the
folder hierarchy.
1. Locate and open the CSV file you exported. The format of the exported CSV file the
name is:
<cloud-management-tenant-name> - Prisma Access_<export-
date>_variables
2. Modify the variables as needed.
Palo Alto Networks does not recommend modifying the folder names, device
names, or device serial numbers. This might result in import failures.
In the example below, the following changes were made to the variable values in the
Firewall-A Configuration Scope to illustrate how variable imports can be used to
modify multiple variables with one operation.
• $example1—Overwrite the inherited None# value with a firewall-specific value.
• $example2—Overwrite the firewall-specific None value with a firewall-specific
value.
• $example3—If the variable was created in the firewall Configuration Scope, an
empty value deletes the variable.
If the variable was inherited from the folder hierarchy, and was overridden in the
firewall Configuration Scope, an empty value restores the variable value inherited
from the folder hierarchy.
• $example4—Overwrite the inherited 192.168.1.101 value with a firewall-specific
value.
• $example5—Example of a variable change Strata Cloud Manager ignores because #
is still appended.
Strata Cloud Manager Getting Started 384 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Export Variables
Export your folder and firewall configuration variables in CSV format to your local device.
Exporting your variables is useful when overwriting a large number of variables across multiple
firewalls.
Exporting interface variables created when you configure an interface at the folder-level isn’t
supported.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Manage > NGFW and Prisma Access > Configuration > OverviewNGFW and Prisma
Access > Overview.
Strata Cloud Manager Getting Started 385 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 5 | Select the folder and firewalls with the variables you want to export and click Next.
If you want to export all variables created on Strata Cloud Manager, select All
Firewalls.
Strata Cloud Manager Getting Started 386 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Manage: Overview
Where Can I Use This? What Do I Need?
Think of the Overview page as your launching point in to NGFW and Prisma Access both for first
time setup, and for day-to-day configuration management (Manage > Configuration > NGFW and
Prisma Access > Overview).
• Global
• Prisma Access
• Configuration Overview (Strata Cloud Manager)
Global
Where Can I Use This? What Do I Need?
•
• license
•
•
If you select the Global configuration scope, you can view the following details:
• Global folders you create and their variables
• Firewalls with config conflicts
• Firewall sync status
• Firewall connectivity status
• General information
• Configuration snippets
Strata Cloud Manager Getting Started 387 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• License
• Optimize
• Trusted tenants for snippet sharing
• Config version snapshots
• license
Basics
Prisma Access configuration Basics guide you to get up and running with Prisma Access.
Complete the tasks here to get started with a basic setup, that you then can use to test your
environment and build out your deployment.
Each task links you to the page where you can set up the associated configuration; when you’re
done, tasks on this list show as complete. So, you can easily track you’re progress at a glance,
which is especially helpful if you’re in the onboarding phase.
Walkthroughs
Some to-do’s also include walkthroughs that take you through the basic, required steps to get
your environment up and running.
Strata Cloud Manager Getting Started 388 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Onboarding walkthroughs are available to you on the Overview dashboard. You can click into to
the help to see if there are walkthroughs available for the page you’re on, and keep an eye out for
walkthroughs you can launch directly on the page:
Strata Cloud Manager Getting Started 389 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Available Walkthroughs
• Onboard Remote Networks
• Onboard Your HQ or Data
Center (Service Connections)
• Onboard Mobile Users
(GlobalProtect)
• Onboard Mobile Users
(Explicit Proxy)
• Turn on decryption
• Policy Optimizer
• Create a Security Rule
• Create a Security Profile
• Set Up SAML Authentication
Strata Cloud Manager Getting Started 390 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• In sync—The latest configuration push to Prisma Access was successful, and there are no
errors.
If you see something unexpected, click on the status to open a map view that shows the locations
where you have either mobile users (GlobalProtect or explicit proxy connections), remote
networks, or service connections. You can then pinpoint the configuration that requires review or
where you might need to make an update.
Strata Cloud Manager Getting Started 391 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
icon beside Push Config on the upper right side of the web interface. Config Search is available
from all pages under Manage.
2. In the Config Search screen, you can search by using the Config String, Location, Object Type,
Edited By, or Edited At fields.
Search tips:
• To find an exact phrase, enclose the phrase in quotes.
• Spaces in search terms are handled as AND operations. For example, if you search on corp
policy, the search results include instances where corp and policy exist in the configuration.
• To rerun a previous search, click the Config Search icon, which displays the last 50 searches.
Click any item in the list to rerun that search. The search history list is unique to each
administrator account.
• Config Search is available for each field that’s searchable. For example, you can search on
the following object types for a Security policy: Tags, Zone, Address, User, HIP Profile,
Application, UUID, and Service.
• Location is grouped by Folders and Snippets. You can select more than one location to
search. If you do not select any location, All locations will be selected by default.
• If the object type is not selected, All will be selected.
3. The search results are categorized and provide links to the configuration location in the Strata
Cloud Manager, allowing you to easily find all occurrences and references of the searched
string.
Strata Cloud Manager Getting Started 392 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
•
•
•
Strata Cloud Manager Getting Started 393 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• Gain visibility and control over local firewall configurations without the need for switching
between the central management and individual firewalls for managing local configurations.
• Firewalls with config conflicts shows the number of firewalls with conflicts. View Conflicts
to see conflicts for all firewalls and their respective locations. Click the individual firewall to
further investigate device-level conflicts.
• Objects with config conflicts shows the number of conflicts per firewall. Click the number
to view the conflicted objects and their corresponding types specific to that firewall. Click
the object to get the granular details on the conflict.
• Connectivity Status
Review the Connectivity Status of managed firewalls to Strata Cloud Manager.
• Sync Status
Review the configuration Sync Status between Strata Cloud Manager and the current
running configuration on your managed firewalls.
• Configuration Snippets
Standardize a common base configuration for a set of managed firewalls using configuration
snippets.
• HA Devices
Configure managed firewalls in a high availability (HA) configuration to provide redundancy
and ensure business continuity.
• For details on your managed firewalls:
• Review Content Distribution and Software Versions details to see which dynamic
content updates and PAN-OS software versions are running on your managed firewalls.
• Review License details to see which licenses are activate on your managed firewalls.
Strata Cloud Manager Getting Started 394 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
icon beside Push Config on the upper right side of the web interface. Config Search is available
from all pages under Manage.
Strata Cloud Manager Getting Started 395 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
2. In the Config Search screen, you can search by using the Config String, Location, Object Type,
Edited By, or Edited At fields.
Search tips:
• To find an exact phrase, enclose the phrase in quotes.
• Spaces in search terms are handled as AND operations. For example, if you search on corp
policy, the search results include instances where corp and policy exist in the configuration.
• To rerun a previous search, click the Config Search icon, which displays the last 50 searches.
Click any item in the list to rerun that search. The search history list is unique to each
administrator account.
• Config Search is available for each field that’s searchable. For example, you can search on
the following object types for a Security policy: Tags, Zone, Address, User, HIP Profile,
Application, UUID, and Service.
• Location is grouped by folders and snippets. You can select more than one location to
search. If you do not select any location, All locations will be selected by default.
• If the object type is not selected, All will be selected.
3. The search results are categorized and provide links to the configuration location in the Strata
Cloud Manager, allowing you to easily find all occurrences and references of the searched
string.
Strata Cloud Manager Getting Started 396 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Manage your security services and protect your network, systems, and users.
Go to Manage > Configuration > NGFW and Prisma Access > Security Services.
Strata Cloud Manager Getting Started 397 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Your security policy is where you define how you want to enforce traffic in your Prisma Access
and NGFW deployments. All traffic that passes through your Strata Cloud Manager environment
is evaluated against your security policy, and rules are applied from the top down.
To set up your security policy, go to Manage > Configuration > NGFW and Prisma Access >
Security Services > Security Policy.
Strata Cloud Manager Getting Started 398 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Manage: Decryption
Where Can I Use This? What Do I Need?
Enable Decryption to stop threats hidden in encrypted traffic. All you need to do to get started
is import your decryption certificates — for everything else, we've built in best practices settings
that you can use to get up and running.
Learn more about decrypting traffic here.
Go to Manage > Configuration > NGFW and Prisma Access > Security Services > Decryption.
Decryption Overview
The Secure Sockets Layer (SSL) and Secure Shell (SSH) encryption protocols secure traffic
between two entities, such as a web server and a client. SSL and SSH encapsulate traffic,
encrypting data so that it is meaningless to entities other than the client and server with the
certificates to affirm trust between the devices and the keys to decode the data. Decrypt SSL and
SSH traffic to:
Prevent malware concealed as encrypted traffic from being introduced into your network. For
example, an attacker compromises a website that uses SSL encryption. Employees visit that
website and unknowingly download an exploit or malware. The malware then uses the infected
employee endpoint to move laterally through the network and compromise other systems.
Prevent sensitive information from moving outside the network.
Ensure the appropriate applications are running on a secure network.
Selectively decrypt traffic; for example, create a Decryption policy and profile to exclude traffic
for financial or healthcare sites from decryption.
Decryption Policies
Strata Cloud Manager provides two types of Decryption policy rules: SSL Forward Proxy to
control outbound SSL traffic and SSL Inbound Inspection to control inbound SSL traffic.
SSL Forward Proxy
Strata Cloud Manager Getting Started 399 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
When you configure the firewall to decrypt SSL traffic going to external sites, it functions as an
SSL forward proxy. Use an SSL Forward Proxy decryption policy to decrypt and inspect SSL/TLS
traffic from internal users to the web. SSL Forward Proxy decryption prevents malware concealed
as SSL encrypted traffic from being introduced into your corporate network by decrypting the
traffic so that the firewall can apply decryption profiles and security policies and profiles to the
traffic.
SSL Inbound Inspection
Use SSL Inbound Inspection to decrypt and inspect inbound SSL/TLS traffic from a client to a
targeted network server (any server you have the certificate for and can import onto the firewall)
and block suspicious sessions. For example, suppose a malicious actor wants to exploit a known
vulnerability in your web server. Inbound SSL/TLS decryption provides visibility into the traffic,
allowing the firewall to respond to the threat proactively.
Decryption Profiles
You can attach a Decryption profile to a policy rule to apply granular access settings to traffic,
such as checks for server certificates, unsupported modes, and failures.
SSL Forward Proxy Profiles
The SSL Forward Proxy Decryption profile controls the server verification, session mode checks,
and failure checks for outbound SSL/TLS traffic defined in Forward Proxy Decryption policies to
which you attach the profile.
SSL Inbound Inspection Profiles
The SSL Inbound Inspection Decryption profile controls the session mode checks and failure
checks for inbound SSL/TLS traffic defined in the Inbound Inspection Decryption policies to which
you attach the profile.
Profile for No Decryption
No Decryption profiles perform server verification checks for traffic that you choose not to
decrypt. You attach a No Decryption profile to a “No Decryption” Decryption policy that defines
the traffic to exclude from decryption. (Don’t use policy to exclude traffic that you can’t decrypt
because a site breaks decryption for technical reasons such as a pinned certificate or mutual
authentication. Instead, add the hostname to the Decryption Exclusion List.)
Decryption Tips
Use the best practice policy rules as a starting point to build your decryption policy
These rules—one that decrypts traffic and one that excludes sensitive content from decryption
—are built based on URL categories.
Strata Cloud Manager Getting Started 400 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Decryption at a Glance
The Decryption screen is the place to configure Decryption Policies and Profiles and view your
Best Practice Assessments.
Strata Cloud Manager Getting Started 401 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
A) Rulebase—Rulebase checks look at how security policy is organized and managed, including
configuration settings that apply across many rules.
B) Best Practices—Here you can get a comprehensive view into how your implementation
of feature aligns with best practices. Examine failed checks to see where you can make
improvements (you can also review passed checks).
C) Best Practice Assessment—Best practice scores are displayed on the decryption dashboard.
These scores gives you a quick view into your best practice progress. At a glance, you can identify
areas for further investigation or where you want to take action to improve your security posture.
D) Decryption Policies—List of onboarded decryption policies. Review the policy configuration,
policy type (SSL Forward Proxy, SSL Inbound Inspection, or SSH Proxy), policy action (decrypt or no-
decrypt), and BPA Verdict.
E) Add Rule—Add and configure new decryption policies.
F) Decryption Settings—Access certificate and decryption settings. Import and export certificates.
G) Add Profile—Add and configure new decryption profiles.
H) Global Decryption Exclusions—Applications excluded from decryption.
I) Decryption Profiles—List of onboarded decryption profiles. Review the profile configuration,
policies using the profile, and the BPA Verdict.
Strata Cloud Manager Getting Started 402 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
You can create various types of network policies to protect your network from threats and
disruptions. It helps you optimize network resource allocation and manage your network policies
to prioritize traffic and configure application classifications.
Rules are evaluated from top to bottom and when traffic matches against the defined rule criteria,
subsequent rules are not evaluated. You should order more specific policy rules above the
more generic ones to enforce the best match criteria possible. A log is generated for traffic that
matches a policy rule when logging is enabled for the rule. Logging options are configurable for
each rule.
Best practice policy rules are available for most policy types and help you to get started quickly
and securely. While these rules cannot be edited to ensure that you always have a minimum
level of security readily available, you can clone them if you want to use them as a foundation for
customizing your policy.
Go to Manage > Configuration > NGFW and Prisma Access > Network Policies.
With network policies, you can:
• Prioritize the traffic that matters most to your operations with Manage: QoS.
• Manage how Prisma Access classifies your applications with Manage: Application Override.
Manage: QoS
Where Can I Use This? What Do I Need?
• One of these:
license
Strata Cloud Manager Getting Started 403 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
With Quality of Service (QoS), you can prioritize business-critical traffic and applications that
require low latency (like VoIP and video applications).To add or edit a QoS policy rule, go to
Manage > Configuration > NGFW and Prisma Access > Network Policies > QoS.
Strata Cloud Manager Getting Started 404 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Create an application override policy to designate applications be processed using fast path
Layer-4 inspection instead of using the App-ID for Layer-7 inspection. This forces the security
enforcement node to handle the session as a regular stateful inspection and saves application
processing times. You can create an application override policy rule when you do not want
traffic inspection for custom applications between known IP addresses. For example, if you
have a custom application on a non-standard port that you know users accessing the application
are sanctioned, and both are in the Trust zone, you can override the application inspection
requirements for the trusted users accessing the custom application.
To change how Prisma Access classifies applications, go to Manage > Configuration > NGFW
and Prisma Access > Network Policies > Application Override to then create your application
override policy rule.
Strata Cloud Manager Getting Started 405 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Policy Based Forwarding rules allow traffic to take an alternative path from the next hop specified
in the route table, and are typically used to specify an egress interface for security or performance
reasons.
Go to Manage > Configuration > NGFW and Prisma Access > Network Policies > Policy Based
Forwarding.
Use a Policy Based Forwarding rule to direct traffic to a specific egress interface and override
the default path for the traffic. Before you create a Policy Based Forwarding rule, make sure you
understand that the set of IPv4 addresses is treated as a subset of the set of IPv6 addresses.
Use the following sections to configure a policy based forwarding rule:
Source
Zones—Add source zones.
Interface—Add source interfaces.
Addresses—Add source addresses, address groups, or regions and specify the settings.
Users—Add the users and user groups to whom the policy applies.
Destination
Addresses—Add source addresses, address groups, or regions and specify the settings.
Application and Services
Application Entities—Select the applications you would like to route through alternative
paths.
A Policy Based Forwarding rule may be applied before the firewall has enough information
to determine the application. Therefore, application-specific rules are not recommended for
use with Policy Based Forwarding. Whenever possible, use a service object.
Strata Cloud Manager Getting Started 406 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Forwarding
Action—You can set the Action to take when matching a packet by choosing from:
Forward—Directs the packet to the specified Egress Interface.
Discard—Drops the packet.
No PBF—Excludes packets that match the criteria for source, destination, application, or
service defined in the rule. Matching packets use the route table instead of PBF.
Egress Interface—Select the network information for where you want to forward the traffic
that matches your Policy Based Forwarding rule.
Next Hop
• IP Address—Enter an IP address or select an address object of type IP Netmask to which
to forward matching packets.
• FQDN—Enter an FQDN (or select or create an address object of type FQDN) to which to
forward matching packets.
• None—No next hop mean the destination IP address of the packet is used as the next
hop. Forwarding fails if the destination IP address is not in the same subnet as the egress
interface.
Monitor—Enable monitoring to verify connectivity to a target IP address or to the Next Hop
IP address if no IP address is specified.
Manage: NAT
Where Can I Use This? What Do I Need?
NAT allows you to translate private, non-routable IPv4 addresses to one or more globally-routable
IPv4 addresses, thereby conserving an organization’s routable IP addresses. NAT also allows you
to not disclose the real IP addresses of hosts that need access to public addresses and to manage
traffic by performing port forwarding. You can use NAT to solve network design challenges,
enabling networks with identical IP subnets to communicate with each other.
You configure a NAT policy rule to match a packet’s source zone and destination zone, at
a minimum. In addition to zones, you can configure matching criteria based on the packet’s
destination interface, source and destination address, and service. You can configure multiple
NAT rules.
Strata Cloud Manager Getting Started 407 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Go to Manage > Configuration > NGFW and Prisma Access > Network Services > NAT.
Manage: SD-WAN
Where Can I Use This? What Do I Need?
• license
→ The features and capabilities available to
you in depend on which license(s) you are
using.
An SD-WAN policy rule specifies application(s) and/or service(s) and a traffic distribution profile
to determine how the firewall selects the preferred path for an incoming packet that doesn’t
belong to an existing session and that matches all other criteria, such as source and destination
zones, source and destination IP addresses, and source user. The SD-WAN policy rule also
specifies a path quality profile of thresholds for latency, jitter, and packet loss. When one of the
thresholds is exceeded, the firewall selects a new path for the application(s) and/or service(s).
To configure an SD-WAN policy, select Manage > Configuration > NGFW and Prisma Access >
Network Policies > SD-WAN.
Rules
You can define Pre rules and Post rules in a shared context, as shared policies for all managed
firewalls, or in a device group context, to make the rules specific to a device group:
• Pre Rules—Rules that are added to the top of the rule order and are evaluated first. You can
use pre-rules to enforce the Acceptable Use Policy for an organization. For example, you can
block access to specific URL categories or allow DNS traffic for all users.
• Post Rules—Rules that are added at the bottom of the rule order and are evaluated after the
pre-rules and rules that are locally defined on the firewall. Post-rules typically include rules to
deny access to traffic based on the App-ID™, User-ID™, or Service.
Profiles
Create profiles to apply to sets of applications and services specified in SD-WAN policy rules.
Path Quality
SD-WAN allows you to create a path quality profile for each set of applications, application filters,
application groups, services, service objects, and service group objects that have unique network
quality requirements and reference the profile in an SD-WAN policy rule. In the profile you set
maximum thresholds for three parameters: latency, jitter, and packet loss. When an SD-WAN link
exceeds any one of the thresholds, the firewall selects a new best path for packets matching the
SD-WAN rule where you apply this profile.
SaaS Quality
Strata Cloud Manager Getting Started 408 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
SD-WAN allows you to create Software-as-a-Service (SaaS) quality profiles to measure the path
health quality between your hub or branch firewall and server-side SaaS applications in order
to accurately monitor SaaS application reliability and swap paths should the path health quality
degrade. This allows the firewall to accurately determine when to failover to a different Direct
Internet Access (DIA) link.
The SaaS quality profile allows you to specify the SaaS application to monitor using an adaptive
learning algorithm that monitors the application activity, or by specifying a SaaS application using
the application IP address, FQDN, or URL.
Traffic Distribution
For this Traffic Distribution profile, select the method the firewall uses to distribute sessions and
to fail over to a better path when path quality deteriorates. Add the Link Tags that the firewall
considers when determining the link on which it forwards SD-WAN traffic. You apply a Traffic
Distribution profile to each SD-WAN policy rule you create.
Error Correction
If your SD-WAN traffic includes an application that is sensitive to packet loss or corruption, such
as audio, VoIP, or video conferencing, you can apply either Forward Error Correction (FEC) or
packet duplication as a means of error correction. With FEC, the receiving firewall (decoder)
can recover lost or corrupted packets by employing parity bits that the encoder embeds in an
application flow. Packet duplication is an alternative method of error correction, in which an
application session is duplicated from one tunnel to a second tunnel. To employ one of these
methods, create an Error Correction Profile and reference it in an SD-WAN policy rule for specific
applications.
(You must also specify which interfaces are available for the firewall to select for error correction
by indicating in an SD-WAN Interface Profile that interfaces are Eligible for Error Correction
Profile interface selection.)
SD-WAN Interface
Create an SD-WAN interface profile to define the characteristics of ISP connections and to
specify the speed of links and how frequently the firewall monitors the link, and specify a Link Tag
for the link. When you specify the same Link Tag on multiple links, you are grouping (bundling)
those physical links into a link bundle or fat pipe. You must configure an SD-WAN interface
profile and specify it for an Ethernet interface enabled with SD-WAN before you can save the
Ethernet interface.
Link Tags
Create a link tag to identify one or more physical links that you want applications and services
to use in a specific order during SD-WAN traffic distribution and failover protection. Grouping
multiple physical links allows you to maximize the application and service quality if the physical
link health deteriorates.
When planning how to group your links, consider the use or purpose of the links and group them
accordingly. For example, if you are configuring links intended for low-cost or non-business-
critical traffic, create a link tag and group these interfaces together to ensure that the intended
traffic flows primarily on these links, and not on more expensive links that may impact business-
critical applications or services.
Strata Cloud Manager Getting Started 409 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Learn to manage your identity services and confirm that only certain users can access the right
data on your network. Go to Manage > Configuration > NGFW and Prisma Access > Identity
Services.
With identity services, you can:
• Enable only legitimate users to access your network by connecting Prisma Access to your
Identity Provider (IdP), and choosing the authentication method you want to use, in Manage:
Authentication.
• Give Prisma Access read-only access to your Active Directory information with the Manage:
Cloud Identity Engine.
• Enforce your security policy consistently and share identity data with on-premises devices at
remote network sites or service connection sites (HQ and data centers) with Manage: Identity
Redistribution.
Manage: Authentication
Where Can I Use This? What Do I Need?
Strata Cloud Manager Getting Started 410 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
To ensure that only legitimate users have access to your most protected resources, Prisma Access
supports several authentication types, including support for SAML, TACACS+, RADIUS, LDAP,
Kerberos, MFA, local database authentication, and SSO.
To set up your authentication policies, go to Manage > Configuration > NGFW and Prisma Access
> Identity Services > Authentication.
Here are the services Prisma Access integrates with to provide authentication, and features to
consider when you are planning your authentication set up:
Authentication Support
SAML If your users access services and applications that are external
to your network, you can use SAML to integrate Prisma
Access with an identity provider (IdP) that controls access to
both external and internal services and applications. SAML
single sign-on (SSO) enables one login to access multiple
applications, and is helpful in environments where each user
accesses many applications and authenticating for each
one would impede user productivity. In this case, SAML
single sign-on (SSO) enables one login to access multiple
applications. Likewise, SAML single logout (SLO) enables a
user to end sessions for multiple applications by logging out
of just one session. SSO works for mobile users who access
applications through the GlobalProtect app or users at remote
networks that access applications through the Authentication
Portal. SLO is available to GlobalProtect app users.
Strata Cloud Manager Getting Started 411 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Cloud Identity Engine The Cloud Identity Engine (CIE) provides both user
identification and user authentication for mobile users in a
Prisma Access—Explicit Proxy deployment. The Cloud Identity
Engine integrates with the Explicit Proxy Authentication
Cache Service (ACS) and uses SAML identity providers (IdPs)
to provide authentication for Explicit Proxy mobile users.
Strata Cloud Manager Getting Started 412 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Local Database Create a database that runs locally on Prisma Access and
Authentication contains user accounts (usernames and passwords or
hashed passwords). This type of authentication is useful for
creating user accounts that reuse the credentials of existing
Unix accounts in cases where you know only the hashed
passwords, not the plaintext passwords. For accounts that use
plaintext passwords, you can also define password complexity
and expiration settings. This authentication method is
available to users who access services and applications
through the Authentication Portal or the GlobalProtect app.
Strata Cloud Manager Getting Started 413 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
For the other factors, users then authenticate through a multi-factor authentication login page.
Strata Cloud Manager Getting Started 414 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
After authenticating users, Prisma Access evaluates your security rules to determine whether
to allow access to the application. Prisma Access logs all activity where users attempt to access
applications, services, or resources that you’ve designated for secure access.
• One of these:
license
To set up authentication with Prisma Access in Strata Cloud Manager, first add your
authentication service(s) to Prisma Access. Then specify the traffic for which you want to
require authentication. Build on these settings to add more authentication features, like MFA,
authentication sequences, or enable Prisma Access to create and update IP address to username
mappings.
Here’s how to get started—all the settings you need to enable authentication with Prisma Access
are in one place: Manage > Identity Services > Authentication.
Strata Cloud Manager Getting Started 415 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Authentication Rules Here’s where you specify the traffic for which you want to require
authentication
Part of setting up an Authentication Rule includes adding an authentication profile to the
rule. When Prisma Access detects traffic that matching an authentication rule, it applies the
authentication methods and settings defined in the authentication profile to the matching
traffic. The profile is what defines how the users will be required to authenticate.
1. Go to Manage > Identity and Access Services > Authentication > Authentication Rule
and Add Authentication Rule.
2. Define the users, services, and URL categories that require authentication.
3. Set the rule action to Authenticate and choose the Profile that defines the
authentication method you want to use for traffic that matches this rule.
Strata Cloud Manager Getting Started 416 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Authentication Profile Add your authentication services here, and define authentication
settings
Connect Prisma Access to the services you want to use to authenticate users—SAML, TACACS
+, RADIUS, LDAP, or Kerberos—and define authentication settings (for example, set a limit for
failed login attempts).
If you are using an on-premise authentication service, you must first create a service
connection to connect the on-premise authentication service to Prisma Access. Then,
return here to set up your authentication profile.
Go to Manage > Identity and Access Services > Authentication > Authentication Profile >
Add Profile and start by setting the profile Auth Type:
You’ll be prompted to add details about the authentication service you chose that will enable
Prisma Access to connect to the service, and read user credentials and role permissions.
Additional settings to customize authentication are provided in the profile, and might vary
depending on the type of authentication you’re setting up.
Strata Cloud Manager Getting Started 417 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 418 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 419 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Authentication Portal Set up the authentication portal (also known as Captive Portal) for users
at remote network sites, and enable Prisma Access to create IP address to username mappings
For first-factor authentication (login and password), users at remote network sites must
authenticate through the authentication portal. If the authentication succeeds, Prisma Access
displays an MFA login page for each additional authentication factor that’s required. Prisma
Access uses the credentials users submit to create and update IP address to username
mappings. This means that you’ll always know who at a remote network site is accessing web
content and enterprise applications.
Authentication Sequence Rank authentication profiles in the order you want Prisma Access to
try them
Select Manage > Identity and Access Services > Authentication > Authentication Profile and
Add Authentication Sequence to rank your authentication profiles. Prisma Access checks each
of them in sequence until one successfully authenticates the user.
Strata Cloud Manager Getting Started 420 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
An authentication profile defines the authentication service that validates the login credentials
of administrators who access the firewall web interface and end users who access applications
through Captive Portal or GlobalProtect. The authentication profile also defines options such as
single sign-on (SSO).
• Kerberos
• Cloud Identity Engine
Cloud Identity Engine
The Cloud Identity Engine (CIE) is used for identifying and authenticating users in firewall web
interfaces and mobile users in a Prisma Access Explicit Proxy deployment. In Prisma Access, the
Cloud Identity Engine integrates with the Explicit Proxy Authentication Cache Service (ACS) and
uses SAML identity providers (IdPs) to provide authentication for Explicit Proxy mobile users.
To authenticate users using Cloud Identity Engine, you must configure an authentication profile.
Strata Cloud Manager Getting Started 421 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 1 | Go to Manage > Configuration > Identity Services > Authentication, set the configuration
scope to Explicit Proxy and Add Profile under Authentication Profiles.
STEP 4 | Select the Cloud Identity Engine authentication Profile you configured in the Cloud Identity
Engine.
Kerberos
Kerberos is a computer network authentication protocol that uses tickets to allow nodes that
communicate over a non-secure network to provide their identity to one another in a secure
manner.
The authentication profile specifies the server profile that the portal or gateways use when they
authenticate users. Follow these steps to set up Kerberos authentication profile for Explicit Proxy
Strata Cloud Manager Getting Started 422 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
mobile users to connect to Prisma Access, for administrators to connect to the firewall web
interface, and for end users to log in to the Authentication Portal.
STEP 1 | Go to Manage > Configuration > Identity Services > Authentication > Authentication
Profiles and Add Profile.
STEP 3 | Enter the Profile Name to identify the server profile. The authentication profile specifies the
server profile that the portal or gateways use when they authenticate users.
STEP 4 | Enter the Kerberos Realm (up to 127 characters) to specify the hostname portion of the
user login name. For example, the user account name [email protected] has the realm
EXAMPLE.LOCAL.
STEP 5 | Import a Kerberos Keytab file which contains the Kerberos account information. When
prompted, browse for the keytab file, and then click Save. During authentication, the
endpoint first attempts to establish SSO using the keytab.
Strata Cloud Manager Getting Started 423 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Cloud Identity Engine (Directory Sync) gives Prisma Access read-only access to your Active
Directory information, so that you can easily set up and manage security and decryption policies
for users and groups.
Cloud Identity Engine works with both on-premises Active Directory and Azure Active Directory.
To set up Cloud Identity Engine with Prisma Access, start by going to the hub to activate Cloud
Identity Engine and to add it to Prisma Access. Then go to Prisma Access to validate that Prisma
Access is able to access directory data.
STEP 1 | Activate Cloud Identity Engine
Cloud Identity Engine can share Active Directory information with any supported app on the
hub. It’s free and does not require an auth code to get started. Cloud Identity Engine setup
includes activating the Cloud Identity Engine app on the hub, configuring the Cloud Identity
Engine agent to gather Active Directory mappings, and configuring mutual authentication
between Cloud Identity and and the agent.
Make sure to deploy the Cloud Identity Engine instance in the same region that you deployed
Prisma Access and Strata Logging Service.
Strata Cloud Manager Getting Started 424 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 3 | Confirm that Prisma Access is connected to Cloud Identity Engine, and that Cloud Identity
Engine is sharing directory information with Prisma Access.
• Check that you can see your directories in Prisma Access.
Go to Manage > Configuration > Identity Services > Cloud Identity Engine:
• Verify that you can add users and groups to a policy rule.
Select Manage > Security Services > Security or Decryption. In a security or decryption
policy rule, check that the Users dropdown displays your Active Directory user and group
entries. Now you can start adding these users and groups to your security and decryption
policy rules.
Use Strata Cloud Manager to set up and manage identity redistribution for NGFWs and Prisma
Access.
• Prisma Access
• NGFW
Strata Cloud Manager Getting Started 425 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 426 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 427 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
the device shares with Prisma Access. Optional settings include the name and a pre-shared
key for the device.
Strata Cloud Manager Getting Started 428 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 429 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 430 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
To redistribute the data, you can use the following architecture types:
• Hub and spoke architecture for a single region:
To redistribute data between firewalls, use a hub and spoke architecture as a best practice.
In this configuration, a hub firewall collects the data from sources such as Windows User-ID
agents, syslog servers, Domain Controllers, or other firewalls. Configure the redistribution
client firewalls to collect the data from the hub firewall.
• Multi-Hub and spoke architecture for multiple regions:
If you have firewalls deployed in multiple regions and want to distribute the data to the
firewalls in all of these regions so that you can enforce policy rules consistently regardless of
where the user logs in, you can use a multihub and spoke architecture for multiple regions.
• Hierarchical architecture:
To redistribute data, you can also use a hierarchical architecture. For example, to redistribute
data such as User-ID information, organize the redistribution sequence in layers, where each
layer has one or more firewalls. In the bottom layer, PAN-OS integrated User-ID agents
running on firewalls and Windows-based User-ID agents running on Windows servers map IP
addresses to usernames. Each higher layer has firewalls that receive the mapping information
and authentication timestamps from up to 100 redistribution points in the layer beneath it. The
top-layer firewalls aggregate the mappings and timestamps from all layers. This deployment
provides the option to configure policy rules for all users in top-layer firewalls and region- or
function-specific policy rules for a subset of users in the corresponding domains served by
lower-layer firewalls.
When traffic isn’t being enforced as expected, use Troubleshooting to check the
dataplane status of specific firewalls to understand whether there’s a mismatch between
expected policies (as configured) and enforced policies.
STEP 2 | Ensure your Strata Cloud Manager deployment meets the requirements to configure identity
redistribution.
1. Configure and activate the Cloud Identity Engine (CIE) for your Strata Cloud Manager
tenant.
This is required to use identity redistribution.
1. Activate the Cloud Identity Engine.
2. Set Up the Cloud Identity Engine.
2. Select Configuration > NGFW and Prisma Access > Objects > Address > Address
Groups and Add Address Group a Dynamic Address Group with the required IP address-
to-tag mappings.
For the address group Type, select Dynamic. Configure the Dynamic Address Group as
needed and Save.
3. Select Configuration > NGFW and Prisma Access > Objects > Dynamic User Groups and
Add a Dynamic User Group with the required username-to-tag mappings.
Configure the Dynamic User Group as needed and Save.
Strata Cloud Manager Getting Started 431 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 3 | Select Configuration > NGFW and Prisma Access > Identity Services > Identity
Redistribution and select the Configuration Scope where you want to configure identity
redistribution.
You can select a folder or firewall from your Folders or select Snippets to configure identity
redistribution in a snippet.
STEP 10 | Enter and confirm the Pre-Shared Key for the collector.
STEP 11 | Save.
STEP 12 | (Cloud Management of NGFW only) Enable identity redistribution for firewalls.
1. Select Configuration > NGFW and Prisma Access > Device > Device Setup >
Management > Service Route Settings and select Customize to configure a service route
for the uid-agent service.
Select the Configuration Scope where you want to create the service route. You can
select a folder or firewall from your Folders or select Snippets to configure the service
route in a snippet.
2. Enable the firewall to respond when other firewalls query it for data to redistribute.
1. Select Configuration > NGFW and Prisma Access > Device > Device Setup >
Management and enable the User-ID network service.
2. Select Configuration > NGFW and Prisma Access > Device > Interfaces to create or
select a Layer 3 interface.
Expand the Advanced Settings. In Other Info, create or edit the Management Profile
to enable User-ID.
Strata Cloud Manager Getting Started 432 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Locally store authentication information for administrators and end users. You can store
authentication information from administrators and end users who authenticate using
GlobalProtect or the Authentication portal.
To configure local database authentication, you create a database that runs locally on the firewall
and contains user accounts (usernames and passwords or hashed passwords). You can configure
a user database that is local to the firewall to authenticate administrators who access the firewall
web interface and to authenticate end users who access applications through Authentication
Portal or GlobalProtect.
Local database authentication can be associated with an authentication profile so they can
accommodate deployments where different sets of users require different authentication settings,
such as Kerberos single sign-on (SSO) or multi-factor authentication (MFA) . For administrator
accounts that use an authentication profile, password complexity and expiration settings aren’t
applied. This authentication method is available to administrators who access the firewall and end
users who access services and applications through Authentication Portal or GlobalProtect.
Go to Manage > Configuration > NGFW and Prisma Access > Identity Services > Local Users &
Groups to start collecting authentication data.
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Identity Services > Local
Users & Groups > Local Users and select the Configuration Scope where you want to create
a local user.
You can select a folder or firewall from your Folders or select Snippets to configure a local
user in a snippet.
Strata Cloud Manager Getting Started 433 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Rather than deleting a local user from the local firewall database for authentication,
you can uncheck (disable) so that the user is no longer enabled for authentication.
STEP 7 | Save.
STEP 2 | Select Manage > Configuration > NGFW and Prisma Access > Identity Services > Local
Users & Groups > Local User Groups and select the Configuration Scope where you want to
create a local user group.
You can select a folder or firewall from your Folders or select Snippets to configure a local
user group in a snippet.
STEP 5 | Add the Local Users you created in the previous step.
STEP 6 | Save.
Strata Cloud Manager Getting Started 434 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
From Device Settings, you can configure the following settings for your cloud-managed firewalls:
Setting Description
Strata Cloud Manager Getting Started 435 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Setting Description
Web proxy for Strata Cloud Manager requires
the legacy router stack. If you'd like this
enabled, please reach out to your account
team.
Strata Cloud Manager Getting Started 436 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Manage: Objects
Where Can I Use This? What Do I Need?
Objects are policy building blocks that group discrete identities such as IP addresses, URLs,
applications, or users. Use them to define and group entities, settings, or preferences. You can
then easily reference and reuse the objects in your policies. When you update an object definition
(or if it can be updated dynamically), the policy rules referencing that object automatically enforce
your latest changes. By grouping objects, you can significantly reduce the administrative overhead
in creating policies.
When used together, some objects can help you to automate policy action: auto-tags,
dynamic user groups, and dynamic address groups.
Go to Manage > Configuration > NGFW and Prisma Access > Objects to get started with policy
objects.
Object Description
Strata Cloud Manager Getting Started 437 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Object Description
include applications, application groups, and
application filters.
Dynamic User Groups Dynamic user groups give you a way to auto-
remediate anomalous user behavior and
malicious activity. Membership in a dynamic
user group is tag-based – users are included
in the group only so long as they match your
defined criteria.
Strata Cloud Manager Getting Started 438 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Object Description
Centrally manage the certificates you use to secure communication across your network. In
one place, set up your certificates, add certificate authorities (Prisma Access includes preloaded
certificates for well-known CAs), add OCSP responders, and define certificate checks you want to
require. The certificates and settings you set up here can be used throughout your Prisma Access
deployment to secure features like decryption, your authentication portal, and the GlobalProtect
app.
Strata Cloud Manager Getting Started 439 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
To ensure trust between parties in a secure communication session, Prisma Access uses digital
certificates. Each certificate contains a cryptographic key to encrypt plaintext or decrypt
ciphertext. Each certificate also includes a digital signature to authenticate the identity of the
issuer. The issuer must be in the list of trusted certificate authorities (CAs) of the authenticating
party. Optionally, the authenticating party verifies the issuer did not revoke the certificate.Prisma
Access uses certificates to secure features like decryption and authentication, and to secure
communication between all the clients, servers, users, and devices connecting to your network.
Here are some of the keys and certificates that Prisma Access uses.
As a best practice, use different keys and certificates for each usage.
Strata Cloud Manager Getting Started 440 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
to use, how to verify certificate revocation status, and how that status constraints access.
Configure a certificate profile for each of your use cases.
• OCSP Responders—Use Online Certificate Status Protocol (OCSP) to check the revocation
status of authentication certificates. The authenticating client sends a request containing the
serial number of the certificate to the OCSP responder (server). The responder searches the
database of the certificate authority (CA) that issued the certificate and returns a response
containing the status (good, revoked or unknown) to the client. The advantage of the OCSP
method is that it can verify status in real-time, instead of depending on the issue frequency
(hourly, daily, or weekly) of CRLs.
• SSL/TLS Service Profiles—Prisma Access uses SSL/TLS service profiles to specify a certificate
and the allowed protocol versions for SSL/TLS services. By defining the protocol versions, you
can use a profile to restrict the cipher suites that are available for securing communication
with the clients requesting the services. This improves network security by enabling Prisma
Access SSL/TLS versions that have known weaknesses. If a service request involves a protocol
version that is outside the specified range, the firewall or Panorama downgrades or upgrades
the connection to a supported version.
• Default Trusted Certificate Authorities (CAs))—Prisma Access trusts the most common and
trusted authorities (CAs) by default. These trusted certificate providers are responsible for
issuing the certificates the firewall requires to secure connections to the internet.The only
additional CAs you might want to add are trusted enterprise CAs that your organization
requires.
Prisma Access gives you simple, centralized management for your SaaS applications. For each
of the apps listed on the SaaS Application Management dashboard—Microsoft 365 apps,
Strata Cloud Manager Getting Started 441 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Google apps, Dropbox, and YouTube—you’ll find features that you can use to safely enable the
applications for enterprise use.
• Microsoft 365
• Google Apps
• Dropbox
• YouTube
Microsoft 365
Prisma Access gives you simple, centralized management for your SaaS applications, including
Microsoft 365 apps.
Strata Cloud Manager Getting Started 442 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• Easy M365 Enablement—Use the built-in settings and guided walkthrough to safely enable
M365 in just a few clicks.
• M365 for Enterprise Use—See all the controls available to you to safely enable M365:
• Microsoft 365 Endpoint Lists
• Microsoft 365 Tenant Restrictions
Easy M365 Enablement
Built-in security and decryption rules, as well as a guided walkthrough, mean you can safely
enable M365 in just a few clicks.
• Built-in security rules allow M365 apps, and ensure that they connect only to Microsoft
endpoints
• Built-in decryption rules skip decryption for traffic destined to Microsoft-categorized Optimize
endpoints (this is Microsoft’s recommendation)
• The guided walkthrough will get you up and running with M365 in two steps.
Strata Cloud Manager Getting Started 443 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 444 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 445 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 1 | Specify the Microsoft 365 domains and tenants to which you want to allow access.
Strata Cloud Manager Getting Started 446 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Google Apps
Prisma Access gives you simple, centralized management for your SaaS applications – including
Google apps – and you can enforce application traffic differently for personal and enterprise
versions of the apps. For example, you can safely enable Google apps on your company network
by restricting employees on managed devices to Google enterprise accounts, and block or limit
access to personal Google accounts.
The EDL Hosting Service releases support for SaaS providers and endpoint list feeds that
are not yet available directly in Prisma Access managed by Cloud Manager. To enforce
policy for Google Cloud Platform (GCP) endpoints, you can create an external dynamic list
based on the feed URL. Learn more about the EDL Hosting Service
Strata Cloud Manager Getting Started 447 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 2 | Add approved domains and tenants for your users to access
Strata Cloud Manager Getting Started 448 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Dropbox
Prisma Access gives you simple, centralized management for your SaaS applications, including
Dropbox. You can safely enable Dropbox on your company network by restricting usage only to
enterprise accounts.
Go to Manage > Configuration > NGFW and Prisma Access. Select Prisma Access configuration
scope, go to Objects > SaaS App Management, and edit Dropbox settings.
To enable tenant restrictions:
STEP 1 | Add approved domains and tenants for your users to access
Strata Cloud Manager Getting Started 449 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
YouTube
Prisma Access gives you simple, centralized management for your SaaS applications, including
YouTube. For YouTube, you can enforce Safe Search settings.
Go to Manage > Configuration > NGFW and Prisma Access. Select Prisma Access configuration
scope, go to Objects > SaaS App Management, and edit YouTube settings.
To enforce Safe Search for YouTube:
Strata Cloud Manager Getting Started 450 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 1 | Add the domains for which you want to enforce Safe Search
Strata Cloud Manager Getting Started 451 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 452 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
• One of these:
license
Review and configure the global settings in Strata Cloud Manager (Manage > Configuration >
NGFW and Prisma Access > Global Settings)
Object Description
User Coaching Notification Template Centrally manage the end user notification
templates to alert users through AI-Powered
ADEM if the user generates an Enterprise
Data Loss Prevention (E-DLP) incident when
traffic containing sensitive data is inspected
and blocked.
Strata Cloud Manager Getting Started 453 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
The End User Coaching Notification Template allows you to configure the notification displayed
to your users in the Access Experience User Interface (UI) when they generate an Enterprise Data
Loss Prevention (E-DLP) incident. An Enterprise DLP incident is generated when a file containing
sensitive data is downloaded or uploaded, or if non-file based traffic containing sensitive data is
posted in a web form.
To determine what is considered sensitive data, you add one or more Inline Data Loss Prevention
DLP rules or Endpoint Data Loss Prevention policy rules. DLP rules and Endpoint DLP policy
rules contain the traffic match criteria that defines what is considered sensitive data. The DLP rule
is derived from the Enterprise DLP data profile of the same name. Additionally, you can configure
custom messages for when a File Based or Non-File Based Enterprise DLP incident is generated.
After an Enterprise DLP incident is generated, the user who generated the incident can view the
Data Security notification for more information about the sensitive data uploaded, downloaded, or
posted.
Only one notification is displayed per incident in a 30 second period regardless of how many
times the user generates the same incident. For example, a user attempts to upload a file
containing sensitive data to the Box Web application and Enterprise DLP blocks the upload. The
user then immediately tries to upload the same file 5 more times but is blocked each time. In
this case only one Access Experience alert is generated even though the user was blocked from
uploading a file containing sensitive date to the Box Web app 6 total times.
• User Coaching Notification Template
STEP 1 | Contact your Palo Alto Networks representative to enable End User Coaching on your
tenant.
STEP 2 | Install the GlobalProtect app version 6.2.7 or later on Windows or macOS.
Strata Cloud Manager Getting Started 454 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
to display notifications to your users in the Access Experience UI when they generate a DLP
incident.
• Access Experience—Select Install.
• Display ADEM Update Notification—Check Enable.
STEP 5 | (macOS only) In the Access Experience UI, select Settings > Notifications and enable Allow
notifications.
This setting must be enabled in the Access Experience UI for each user and is required to
display notifications on the user's desktop. Configure the rest of the Access Experience
notifications settings as needed.
STEP 7 | Select Manage > Configuration > NGFW and Prisma Access > Global Settings > User
Coaching Notification Template > Notification Template and Add Notification Template.
Strata Cloud Manager Getting Started 455 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 456 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Access Experience UI. A single DLP rule can be added to multiple User Coaching Notification
Templates.
All DLP rules added to the notification template generate the same Notification Message
when Enterprise DLP blocks sensitive data that match the data profiles associated with the
DLP rule.
You can View Details for each DLP rule you add to review the specific inspection details. This
includes the traffic inspection Direction, applicable File Type, Action, and whether the DLP
rule is inspecting for File Based Match Criteria, Non-File Based Match Criteria, or both.
Strata Cloud Manager Getting Started 457 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
STEP 10 | Define the Notification Message users receive when Enterprise DLP blocks sensitive data
that match the data profiles associated with the DLP rule.
The message templates are the Access Experience toast notifications users receive when
Enterprise DLP blocks sensitive data. You can use the following variables in your message
templates. You must include the brackets for each variable.
• [file name]—File name and extension containing sensitive data blocked by Enterprise
DLP.
• (File Based only) [direction]—Specifies whether Enterprise DLP blocked a file upload or
download.
• [app name]—Application user attempted to upload to, download from, or post non-file
based content.
• [action]—Action Enterprise DLP took when sensitive data was detected. This value is
always Blocked.
1. Define the Message Template for File based detections.
Skip this step if the DLP rule isn't configured for file based detections.
2. Define the Message Template for Non-File based detections.
Skip this step if the DLP rule isn't configured for non-file based detections.
3. Add a Support Link.
You can add links directly into the Access Experience toast notification that describe
your company policy for sharing or downloading sensitive data.
STEP 11 | Save.
STEP 12 | The user who generated the Enterprise DLP incident can view the Data Security notification
to see a snippet of the sensitive data that was uploaded, downloaded, or posted.
Strata Cloud Manager Getting Started 458 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Manage: Operations
Where Can I Use This? What Do I Need?
• NGFW (Managed by Panorama or Strata AIOps for NGFW Premium license (use the
Cloud Manager) Strata Cloud Manager app)
• Including VM-Series → The features and capabilities available to
you in Strata Cloud Manager depend on which
license(s) you are using.
Troubleshooting
Troubleshoot your NGFWs from Strata Cloud Manager without having to move between various
firewall interfaces.
The troubleshooting dashboard allows you to troubleshoot Network, Identity, and Policy issues
for your Strata Cloud Managed NGFWs. Using the troubleshooting dashboard, you can locate
anomalies and problematic configurations for the following areas:
DNS Proxy
NAT
User Groups
Dynamic Address Groups
Dynamic User Groups
User ID
Session Browser
To get started, go to Manage > Configuration > NGFW and Prisma Access > Operations > >
Troubleshooting > Session Browser.
Strata Cloud Manager Getting Started 459 ©2025 Palo Alto Networks, Inc.
Manage: NGFW and Prisma Access
Strata Cloud Manager Getting Started 460 ©2025 Palo Alto Networks, Inc.
Manage: IoT Policy
Recommendation
Where Can I Use This? What Do I Need?
• subscription
• NGFWs
(with or configuration management) Software NGFW Credits
(for VM-Series software NGFWs)
IoT Security provides Strata Cloud Manager with automatically generated Security policy rule
recommendations organized by device profile. There is one recommendation per application per
profile. Choose a profile, select the rule recommendations you want to use, and then the next-
generation firewalls or Prisma Access deployment types where you want to enforce them.
461
Manage: IoT Policy Recommendation
Get Started
Select Security policy rule recommendations and apply them to next-generation firewalls or
Prisma Access.
STEP 1 | Create folders or snippets for next-generation firewalls.
Skip this step if you want to use predefined folders or previously created folders or
snippets. Prisma Access folders are predefined.
Folders are essentially containers that hold various kinds of rules, security configurations,
and objects. For importing the policy rule recommendations that IoT Security generated, the
folders would hold next-generation firewalls or Prisma Access deployments.
Snippets are also a type of container that can be associated with multiple folders. With folders
and snippets, you can import policy rules into whichever groups of firewalls or deployments
you want.
For example, you might create a folder named California and put 60 firewalls in it and then
create another folder named Hawaii and put 15 firewalls in that. You then create a snippet
called CA-HI and apply it to the California and Hawaii folders. When you want to import
rule recommendations only to firewalls in California, you set the scope as Folder and select
the California folder. If you want to import the rule recommendations to both California and
Hawaii, set the scope as Snippet and select the CA-HI snippet.
Depending on the hierarchy of the folder structure, we might have a parent folder like US-
West above California and Hawaii. Then if you import rule recommendations while the scope
is set as Folder with US-West selected, then both of the children folders California and Hawaii
would inherit the imported rules. However, this wouldn't work if you only wanted to import
rules to California and Hawaii if they had sibling folders like Oregon, Alaska, Washington, and
Arizona under the US-West folder. Then you'd have to use the CA-HI snippet.
Strata Cloud Manager Getting Started 462 ©2025 Palo Alto Networks, Inc.
Manage: IoT Policy Recommendation
Strata Cloud Manager Getting Started 463 ©2025 Palo Alto Networks, Inc.
Manage: IoT Policy Recommendation
STEP 3 | Push the configuration to next-generation firewalls and Prisma Access deployments.
1. Select Manage > Operations > Push Config.
2. Select the folders with the configuration changes, Push Config, Push, and then Push again.
Strata Cloud Manager displays an ID number in the Job ID column for the selected folders
and the status of the configuration push in the Push Status column.
When the Push Status changes from Pending to Success, you know the pushed
configuration has started running.
3. To see the status of a push job, select Manage > Operations > Push Status. There you can
see the status of the parent job and also the status of the children jobs, one for each firewall
or deployment.
Strata Cloud Manager Getting Started 464 ©2025 Palo Alto Networks, Inc.
Manage: Enterprise DLP
Where Can I Use This? What Do I Need?
• • license
(with or configuration management)
• —Support and device management
• NGFWs
licenses
(with or configuration management) • — license
• — license
• —Support and licenses
Or any of the following licenses that include
the license
• CASB license
• license
• license
Enterprise Data Loss Prevention (E-DLP) protects sensitive information against unauthorized
access, misuse, extraction, or sharing. Enterprise DLP on Strata Cloud Manager enables you to
enforce your organization’s data security standards and prevent the loss of sensitive data across
your NGFWs, and your Prisma Access mobile users and remote networks.
465
Manage: Enterprise DLP
Strata Cloud Manager Getting Started 466 ©2025 Palo Alto Networks, Inc.
Manage: Enterprise DLP
Feature Highlights
The Enterprise Data Loss Prevention (E-DLP) Dashboard
Go to Manage > Configuration > Data Loss Prevention to configure and manage Enterprise
DLP.
Your Enterprise DLP configuration is shared across the products where you’re using Enterprise
DLP. So you might see settings here that were configured elsewhere, and some settings you
can configure here can also be leveraged in other products.
Predefined + Custom Enterprise DLP Settings
Enterprise DLP includes built-in settings that you can use to quickly start protecting your most
sensitive content:
• Predefined regex and ML-based data pattern specify common types of sensitive information
(like credit cards and social security numbers) that you might want to scan for and protect
• Predefined data profiles group together data patterns that commonly require the same type
of enforcement
You can also create custom data patterns and profiles directly on Strata Cloud Manager.
Investigation for DLP Incidents
A DLP incident is generated when traffic matches a DLP data profile attached to a security
policy rule on Strata Cloud Manager. On the DLP Incidents dashboard, you can view details
for the traffic that triggered the incident, such as matched data patterns, the source and
destination of the traffic, the file and file type.
Scanning for Images in Supported File Formats
Strengthen your security posture to further prevent accidental data misuse, loss, or theft with
Optical Character Recognition (OCR). OCR allows the DLP cloud service to scan supported file
types with images containing sensitive information that match your Enterprise DLP filtering
profiles.
Exact Data Matching (EDM)
EDM is an advanced detection tool to monitor and protect sensitive data from exfiltration. Use
EDM to detect sensitive and personally identifiable information (PII) such as social security
numbers, Medical Record Numbers, bank account numbers, and credit card numbers, in a
structured data source such as databases, directory servers, or structured data files (CSV and
TSV), with high accuracy.
Custom Document Types
Upload your custom documents that contain intellectual property or sensitive information
to Enterprise Data Loss Prevention (E-DLP) to create custom document types. Your custom
document types are used as match criteria in advanced data profile to detect and prevent
exfiltration.
Email DLP
Email DLP prevents exfiltration of emails containing sensitive information with AI/ML powered
data detections. For example, Enterprise DLP can prevent exfiltration of sensitive data over an
outbound email sent from a salesperson within your organization to their personal email.
Strata Cloud Manager Getting Started 467 ©2025 Palo Alto Networks, Inc.
Manage: Enterprise DLP
Strata Cloud Manager Getting Started 468 ©2025 Palo Alto Networks, Inc.
Manage: Enterprise DLP
Get Started
STEP 1 | Enable Enterprise DLP on Strata Cloud Manager.
To set up Enterprise DLP, you need to create a decryption profile to allow the DLP cloud
service to inspect traffic. Select Manage > Configuration > Security Services > Decryption
and:
1. Select Manage > Configuration > NGFW and Prisma Access > Security Services >
Decryption and Add Rule.
The predefined decryption profile settings enable Enterprise DLP to inspect traffic.
Modifying the predefined decryption profile settings isn't required unless you need to
enable Strip ALPN (Advanced Settings > SSL Forward Proxy).
2. Add the decryption profile to an SSL Forward Proxy decryption rule.
• Here’s how to enable Enterprise DLP
STEP 2 | (Optional) Select Manage > Configuration > Data Loss Prevention > Detection Methods and
create a Data Pattern
You can create custom Enterprise DLP data patterns to specify what content is sensitive
and needs to be protected—this is the content you’re filtering. You can create a custom data
pattern based on regular expressions or a data pattern based on file properties.
• Here’s how to create a data pattern
Strata Cloud Manager Getting Started 469 ©2025 Palo Alto Networks, Inc.
Manage: Enterprise DLP
Strata Cloud Manager Getting Started 470 ©2025 Palo Alto Networks, Inc.
Workflows: SaaS Security
Where Can I Use This? What Do I Need?
Identify cloud-based threats and risky user activity in sanctioned and unsanctioned apps with
SaaS Security Inline.
SaaS Security is an integrated CASB (Cloud Access Security Broker) solution that:
• Provides visibility and control over all your shadow IT risks.
• Secures SaaS apps from known and unknown cloud threats.
• Protects sensitive data and ensures compliance across all SaaS apps.
• Allows access to corporate apps only for legitimate users.
SaaS Security Inline is built-in to Prisma Access Managed by Strata Cloud Manager to give you a
centralized view of network and CASB security. It offers SaaS visibility—which includes advanced
analytics and reporting—so that your organization has the insights to understand the data security
risks of sanctioned and unsanctioned SaaS application usage on your network.
Cloud Access Security Broker (CASB) bundle includes Saas Security Inline, Enterprise Data Loss
Prevention (DLP) Inline, SaaS Security API, Data Loss Prevention (DLP) API, and SaaS Security
Posture Management (SSPM).
The Next-Generation Cloud Access Security Broker (CASB-X) license contains all the CASB
components such as SaaS Security Inline, SaaS Security API, SaaS Security Posture Management
(SSPM), and Enterprise DLP. It can be applied on Cloud-Managed Prisma Access, Panorama
Managed Prisma Access, and Panorama-Managed Next Generation Firewall (NGFW) devices in a
single tenant environment.
Here’s everything you need to know to use SaaS Security on Strata Cloud Manager.
471
Workflows: SaaS Security
Get Started
Here’s how to get up and running with SaaS Security Inline on Prisma Access Managed by Strata
Cloud Manager:
Confirm that the SaaS Security add-on license is included with your Prisma Access
subscription.
Go to Manage > Configuration > Overview to check what's available with your license.
If you haven’t already, activate the SaaS Security Inline app on the hub.
After activation, SaaS Security Inline automatically discovers all SaaS applications and users
and analyzes users’ SaaS activity and usage data from your Prisma Access logs that are stored
in Strata Logging Service.
To comprehensively manage SaaS Security, users must also be an administrator for the
SaaS Security Inline app. Jump directly from the Prisma Access Cloud Management
dashboard to the SaaS Security Console to add SaaS Security Inline administrators.
Explore the SaaS Security dashboard in Prisma Access Managed by Strata Cloud Manager.
Go to Manage > Configuration > Security Services > SaaS Security.
All dashboard views are supported directly in Prisma Access Managed by Strata Cloud
Manager. Examine these views to identify risky SaaS applications and users and SaaS Security
Posture Management. SaaS Security Posture Management (SSPM) helps detect and remediate
misconfigured settings in sanctioned SaaS applications through continuous monitoring.
See what else you can do with SaaS Security and Prisma Access Managed by Strata Cloud
Manager.
Strata Cloud Manager Getting Started 472 ©2025 Palo Alto Networks, Inc.
Workflows: SaaS Security
Strata Cloud Manager Getting Started 473 ©2025 Palo Alto Networks, Inc.
Workflows: SaaS Security
3. The SaaS rule recommendations you’ve imported are labeled so you can easily identify them.
Strata Cloud Manager Getting Started 474 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
Where Can I Use This? What Do I Need?
Prisma SD-WAN provides a software-defined, wide area network (SD-WAN) solution that
transforms legacy wide area networks (WANs) into a radically simplified, secure, application fabric
(AppFabric), virtualizing heterogeneous underlying transports into a unified hybrid WAN. At the
core of the system is the application performance engine.
You can view granular application-driven analytics, build a robust policy, and performance-based
traffic management of the WAN. Through Instant-On Network (ION) devices, Prisma SD-WAN
simplifies how WANs are designed, built, and managed, securely extending data center-class
security to the network edge.
Prisma SD-WAN supports stacked policies for flow forwarding operations. Using centrally-defined
policies, each ION device performs actions such as automatic path selection, traffic shaping, or
active-active load balancing between links, while the Prisma SD-WAN controller provides full
visibility into application performance and response times across all WAN links.
Prisma SD-WAN controls network application performance based on application-performance
service level agreements (SLAs) and business priorities. You can configure policies, resources,
CloudBlades, and system settings for Prisma SD-WAN using Strata Cloud Manager.
Select Manage > Prisma SD-WAN to manage configurations for:
• Policies
• Resources
• CloudBlades
• System
475
Manage: Prisma SD-WAN
Prisma SD-WAN supports stacked and original policies. Using centrally-defined policies, each
ION device performs actions such as automatic path selection, traffic shaping, or active-active
load balancing between links, while the Prisma SD-WAN controller provides full visibility into
application performance and response times across all WAN links.
Configure policies in Prisma SD-WAN using Strata Cloud Manager.
STEP 1 | Select Manage > Prisma SD-WAN > Policies.
You can configure the following types of policies in Prisma SD-WAN:
• Path
Configure stacked path policies for flow forwarding and traffic shaping operations.
• Performance
Configure performance policies to measure application performance and App SLAs.
• QoS
Configure stacked QoS policies for specifying business priorities.
• Security
Configure stacked security policies to define rules that determine application access within
a branch.
• NAT
Configure stacked NAT policies to ensure privacy of internal networks connected to public
or private networks.
• Security (Original)
These are legacy security policies. If you are a new user starting with ION device software
version 6.0.1, you can configure only stacked security policies. If you have configured
original or legacy policies, you have to convert these legacy policies to stacked policies
before you can upgrade your device to Release 6.0.1.
• Network (Original)
These are legacy network policies. If you are a new user starting with ION device software
version 6.0.1, you can configure only stacked network policies. If you have configured
original or legacy policies, you have to convert these legacy policies to stacked policies
before you can upgrade your device to Release 6.0.1.
Strata Cloud Manager Getting Started 476 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
Strata Cloud Manager Getting Started 477 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
Strata Cloud Manager Getting Started 478 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
• Site Templates
Site configuration template helps you to create tailored site templates that cater to your
deployment requirements, allowing you to efficiently deploy branches and data centers at
scale with ease. Using this template, you can deploy multiple sites. You can use an existing
template, edit an existing one or create a new template to deploy multiple sites.
• Prefix Filters
A prefix is a group of one or more individual IP addresses or IP address subnets. Prefixes are
used with Path Set Policies and Priority Policies. They can be either global or local in scope.
• Configuration Profiles
Use configuration profiles to configure settings for different types of resources.
• IPsec
Create an IPsec profile to configure IPsec VPN connections between branch devices and
cloud security service endpoints.
• IPFIX
An IPFIX profile is a global IPFIX configuration object which identifies collector
configuration, filter configuration, the template for exporting flow information elements,
and flow sampler configuration.
• APN
Create an Access Point Name (APN) profile to define the network path for cellular data
connectivity. APN information is required to connect to a cellular network.
• DNS
Configure a Domain Name System (DNS) Profile to specify configuration parameters
for the DNS service. Commonly configured parameters include DNS Servers, Domain
to Address Mapping, Cache Configuration, and DNSSEC Configuration. After the DNS
service profile is created, it is bound to a device.
• NTP Templates
Use Network Time Protocol (NTP) configuration templates to add or edit NTP servers.
• Multicast
Create a WAN multicast configuration profile and associate it with a branch site to
enable multicast WAN multicast routing for the branch site.
• VRF
Create and associate the Global (default) Virtual Routing and Forwarding tables (VRF)
profile and assign it to all branch and data centers sites.
• IoT Discovery
Use IoT device visibility to identify devices in your network. Prisma SD-WAN branch
ION devices inspect packets, extract information, and generate messages to send to
Strata Logging Service in a specific format.
Strata Cloud Manager Getting Started 479 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
Use Prisma SD-WAN CloudBlades to securely access ION devices to automate web interface
workflows with customized templates for reducing operational complexity.
Configure CloudBlades in Prisma SD-WAN using Strata Cloud Manager.
Select Manage > Prisma SD-WAN > CloudBlades.
You will be able to view the CloudBlades that you have subscribed for in Prisma SD-WAN. Use
the steps in the relevant CloudBlade Integration to configure your CloudBlade.
Strata Cloud Manager Getting Started 480 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
Manage and monitor users and permissions in Prisma SD-WAN using the resources available
under the System tab.
Select Manage > Prisma SD-WAN > System.
You can configure the following types of system resources in Prisma SD-WAN:
• License Management
Use License Management to generate authorization tokens for virtual ION. This provides a
set of controls to prevent unauthorized addition of virtual devices to an environment.
• Audit Logs
Use Audit Logs to view the configuration change records in a system. You can use these
logs for compliance and troubleshooting purposes. Audit logs provide information such as
changes made, owner of the change, time of change, and the scope of the change at a site,
system, or a subset of sites.
• Enterprise Prefixes
Use Enterprise Prefixes to allow Prisma SD-WAN data center sites to easily advertise routes
and reachability to branch sites.
• Access Management
• User Access
• User Management
Add a new user with a system role as per the requirements of your enterprise.
System roles are a pre-defined set of permissions for each role. These roles include
a collection of one or more system permissions. Available system roles include
Strata Cloud Manager Getting Started 481 ©2025 Palo Alto Networks, Inc.
Manage: Prisma SD-WAN
Strata Cloud Manager Getting Started 482 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Where Can I Use This? What Do I Need?
• license
(with or configuration management)
From Strata Cloud Manager, select Manage > Configuration > Prisma Access Browser.
483
Manage: Prisma Access Browser
Strata Cloud Manager Getting Started 484 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Prisma Access Secure Enterprise Browser (Prisma Access Browser) is the only solution that
secures both managed and unmanaged devices, through a natively integrated enterprise browser
that extends protection to unmanaged devices. See What is the Prisma Access Browser?
Strata Cloud Manager Getting Started 485 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Home
Home is the landing page when you access Prisma Access Browser from Strata Cloud Manager.
From the home page, you can use the Prisma Access Browser Dashboards to derive meaningful
insights from the analysis of user behavior and browsing data. There are a variety of dashboards
for specific use cases you might want to monitor, such as user behavior, data leak prevention, web
security, and policy. Each dashboard contains a collection of widgets and some of the widgets
appear in multiple dashboards.
Strata Cloud Manager Getting Started 486 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Analytics
The Prisma Access Browser Events screen is the key visibility tool for investigating every activity
within your Enterprise Browser deployment to verify that policies and rules are working as they
should. This is where you investigate Prisma Access Browser Events.
Strata Cloud Manager Getting Started 487 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Directory
• The Users directory serves as a central location for information regarding the users and their
Prisma Access Browser connected devices, membership in user groups, and related policy
rules. Manage Prisma Access Browser Users
• The device directory provides a roster of your Prisma Access Browser devices and device
groups. Manage Prisma Access Browser Devices
• The Prisma Access Browser comes equipped with a preexisting list of Verified applications. The
Verified applications list references the Palo Alto Networks App-ID™ catalog of applications,
and is regularly synced with the cloud database. You can also create custom and private
applications. Manage Prisma Access Browser Applications
• The Prisma Access Browser maintains an Extension directory that includes extensions installed
by end-users on the browser. This information allows you to maintain proper corporate policy
management, manage visibility and risk analysis.Manage Prisma Access Browser Extensions
Strata Cloud Manager Getting Started 488 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Policy
• You can use Rules to specify the Users, User Groups, and Device Groups that will be impacted
by the various policies. These rules govern access to web applications, security policies, and
customization options. By utilizing rules, you can precisely control user access to organizational
tools and components.Manage Prisma Access Browser Policy Rules
• The Controls for the Prisma Access Browser rules can be configured within the body of the
individual rule. Profiles (external controls) can be used when you want to save reusable (legacy)
profiles and add them to the rules later. Manage Prisma Access Browser Policy Profiles
• Use sign-in rules to determine which users and devices have access to Prisma Access Browser.
Manage Prisma Access Browser Sign-in Rules
• After you define the bypass conditions within the policy rules, when users attempt to perform
and action or visit a site blocked by the corresponding rule, they can submit a bypass request.
To set bypass conditions, you configure the prompt action to enable permission requests.
Manage Prisma Access Browser Requests to Bypass Policy Rules.
Strata Cloud Manager Getting Started 489 ©2025 Palo Alto Networks, Inc.
Manage: Prisma Access Browser
Administration
Manage integrations for additional functionality with the following:
• Microsoft 365
• Microsoft Information Protection
• Google Workspace
• Votiro
• CrowdStrike Falcon Intelligence
• OPSWAT MetaDefender
• YazamTech SelectorIT
• Symantec DLP
Strata Cloud Manager Getting Started 490 ©2025 Palo Alto Networks, Inc.
Manage: Operations
Where Can I Use This? What Do I Need?
Use the Strata Cloud Manager operations to push configuration changes, review past
configuration pushes, and manage your configuration versions snapshots to load or revert them to
a previous configuration version.
• Push your configuration changes
• Review the status of a configuration push
• See how you can clean up your configuration
491
Manage: Operations
After you make configuration changes and are ready to activate them, you must push the changes
to your firewalls. You have the option to push all configuration changes or to select specific
administrators to include in the push. Pushing changes from all administrators is required for your
first configuration push. You can choose which configuration changes you want to push to Prisma
Access:
• Mobile Users — GlobalProtect
Push Global Protect updates to Prisma Access.
• Mobile Users — Explicit Proxy
Push Explicit Proxy updates to Prisma Access.
• Remote Networks
Push Remote Networks updates to Prisma Access.
• Service Connections
Push Service Connection updates to Prisma Access.
You can push a configuration while another configuration push is taking place. Prisma Access
applies configuration changes in the order you submit them.
In the event a configuration is pushed in error, or a change causes network or security disruption,
you can revert the Prisma Access configuration to the most recent running Prisma Access
configuration. This allows you to revert the Prisma Access configuration back to a running
configuration you know is functional and does not compromise your network security. You do not
have the option to select a specific running configuration. Prisma Access automatically selects the
last known running configuration and reverts to it.
STEP 1 | Log in to Strata Cloud Manager.
Strata Cloud Manager Getting Started 492 ©2025 Palo Alto Networks, Inc.
Manage: Operations
Alternatively, you can select Manage > Operations > Push Config To Devices.
In the Push Config dialog box, you can Ignore Security Check Failures. This feature allows you
to continue with push operations even when certain checks would block the process. If you
leave the check box unchecked (the default setting), and a best practice check with a “block”
action fails, Strata Cloud Manager stops the push.
You can Ignore Security Check Failures only if your role includes the Override Security
Check Block Action permission.
Strata Cloud Manager Getting Started 493 ©2025 Palo Alto Networks, Inc.
Manage: Operations
Performing a partial configuration push is not supported and you must push the entire
Strata Cloud Manager configuration if you:
• Configure a new tenant and this is your first configuration push.
• Onboard a firewall to Strata Cloud Manager.
• Onboard a Prisma Access mobile users and remote users.
• Rename or move a folder so that it’s nested under a different folder.
• Move a firewall to a different folder.
• Rename, associate, or disassociate a snippet.
• Load a configuration.
• Revert the configuration to the last pushed configuration or to a previous
configuration version snapshot.
• Admin Scope — Select which administrator configuration changes to include in the push. By
default, admin scope selects the current user, and changes made by that user are pushed to
the selected firewalls or Prisma Access deployments. Selecting changes Changes from all
admins includes all configuration changes made by all administrators.
Editing the admin scope to select specific administrators includes all the configuration
changes made by the selected administrators. This option can't be used when performing
your first config push. Selecting specific configuration changes to include in the push is not
supported.
• Push Scope — Select the deployment types or folders you want to push to. When you
select a deployment or folder, the configuration changes are pushed to all firewalls or
deployments.
When you select a folder that contains child folders, all child folders and the associated
firewalls or Prisma Access deployments are included in the push. Selecting a specific firewall
or a Prisma Access deployment automatically selects the folder it’s associated with.
Strata Cloud Manager Getting Started 494 ©2025 Palo Alto Networks, Inc.
Manage: Operations
In the event a configuration is pushed in error, or a change causes network or security disruption,
you can revert your Prisma Access configuration.
➡ Restore, load, and compare configuration versions
STEP 2 | On the top menu bar, select Push Config and view the Prisma Access Jobs.
Strata Cloud Manager Getting Started 495 ©2025 Palo Alto Networks, Inc.
Manage: Operations
Strata Cloud Manager Getting Started 496 ©2025 Palo Alto Networks, Inc.
Manage: Operations
Review the push status for your past configuration pushes to your firewalls to review details such
as the push operation result, the admin that initiated the push, and the target firewalls.
STEP 1 | Log in to Strata Cloud Manager.
STEP 3 | Select Manage > Operation > Push StatusConfiguration > Operation > Push Status and
locate the configuration push operation you want to review.
STEP 4 | Expand the Job ID for the configuration push you want to review.
A configuration Validation job is always performed before any configuration push occurs.
When you push to multiple firewalls, each configuration push has a unique Job ID with push
details.
STEP 6 | Click the unique Job ID for a configuration push to a firewall to review the Job Details.
The Job Details provide detailed information about Warnings and Errors encountered
when performing the configuration push. For example, if a push to a firewall failed you can
review the Job Details to understand what caused the configuration push to fail.
Strata Cloud Manager Getting Started 497 ©2025 Palo Alto Networks, Inc.
Manage: Operations
Configuration snapshots give you a view into your Strata Cloud Manager configuration history.
When a configuration push has unintended security implications or an unexpected impact on
traffic, you can recover by reverting to an earlier version. You can also compare configurations to
see what’s changed across versions.
1. Add New Filter—Choose filters to sort and filter config versions by column.
2. Version—The version number of the configuration that was pushed.
The Candidate allows you to compare the currently pending configuration changes to Strata
Cloud Manager with a previous configuration version.
Strata Cloud Manager Getting Started 498 ©2025 Palo Alto Networks, Inc.
Manage: Operations
9. Description—Review any information provided at the time the config was pushed.
10.Refresh—Update the information in the snapshot table.
11.Reset Filters—Clear all the filters to display all config versions.
12.Compare—See what has changed from version to version.
You can compare only two versions at a time.
13.Actions— You can Restore or Load a config version.
• Restore – Restore an earlier configuration version.
Restoring a configuration version directly updates the running configuration on the
deployments within the scope of the original push and does not require you to Push
Config.
Restore all the devices or deployments in the original scope of the configuration push or
select specific devices or deployments to restore. You can’t expand the configuration to
include devices or deployments outside of the original scope.
Restoring a config version does not delete or modify the candidate configuration. The
configuration in progress will be saved. Restoring a configuration just updates the
Strata Cloud Manager Getting Started 499 ©2025 Palo Alto Networks, Inc.
Manage: Operations
running configuration version. Deployments may appear out of sync when the restore
action is used.
• Load – Load an earlier version as your candidate configuration in Strata Cloud Manager.
Your current candidate configuration will be lost when an older configuration is loaded.
Make updates to the new candidate configuration or apply the configuration to new
devices and deployments outside of the original configuration snapshot, and, when
you’re ready, Push Config.
• Save – Save the candidate configuration as a named snapshot to use as a known
configuration. Having a known configuration allows you to easily bring your deployments
to a known and workable state. You can switch back and forth between your Named
Snapshots and the automatically logged configuration pushes in Version Snapshots.
Strata Cloud Manager Getting Started 500 ©2025 Palo Alto Networks, Inc.
Manage: Operations
When you save a Named Snapshot, it will replace the current candidate configuration.
STEP 7 | (Optional) Verify that your snapshot was saved by navigating to the Named Snapshots in the
Config Version Snapshot table.
Restore a Snapshot
Restore a previously pushed configuration. Restoring an older configuration updates the
configuration running on the deployments and devices. These changes are not reflected in the
Strata Cloud Manager, so deployments and devices may appear out of sync.
Only configured devices that were within the scope of the original configuration push can be
restored to a selected version.
STEP 1 | Log into Strata Cloud Manager.
Strata Cloud Manager Getting Started 501 ©2025 Palo Alto Networks, Inc.
Manage: Operations
STEP 5 | (Optional) Select Manage > Configuration > Operations > Push Config to validate the
configuration was restored.
Load a Snapshot
Load an earlier configuration snapshot to use as your candidate configuration.
Once the configuration has been loaded, you can continue to make modifications to it before
pushing.
STEP 1 | Log into Strata Cloud Manager.
Strata Cloud Manager Getting Started 502 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Where Can I Use This? What Do I Need?
Use these tools to improve your security posture and verify that you're protected against threats
by following security policy best practices.
• Customize security posture checks for your deployment to maximize relevant
recommendations in Manage: Security Posture Settings
• Use Config Cleanup to identify and remove unused configuration objects and policy rules.
• Configure Compliance Checks to hone and optimize overly permissive security rules so that
they only allow applications that are actually in use in your network.
• Create your own Manage: Security Posture Settings – Customize existing best practice checks
and create and manage special exemptions to better align to your organization’s business
requirements.
• Use Policy Analyzer to quickly ensure that updates you make to your security policy rules meet
your requirements and do not introduce errors or misconfigurations (such as changes that
result in duplicate or conflicting rules).
503
Manage:Security Posture
Updates to your Security policy rules are often time-sensitive and require you to act quickly.
However, you want to ensure that any update you make to your security policy rulebase meets
your requirements and does not introduce errors or misconfigurations (such as changes that result
in duplicate or conflicting rules).
To achieve this, Policy Analyzer in Strata Cloud Manager enables you to optimize time and
resources when implementing a change request. Policy Analyzer not only analyzes and provides
suggestions for possible consolidation or removal of specific rules to meet your intent but
also checks for anomalies, such as Shadows, Redundancies, Generalizations, Correlations, and
Consolidations in your rulebase.
Use Policy Analyzer to add or optimize your Security policy rulebase.
• Before adding a new rule—Check to see if new rules need to be added. Policy Analyzer
recommends how best to change your existing Security policy rules to meet your requirements
without adding another rule, if possible.
• Streamline and optimize your existing rulebase—See where you can update your rules to
minimize bloat and eliminate conflicts and also to ensure that traffic enforcement aligns with
the intent of your Security policy rulebase.
Analyze your Security policy rules both before and after you commit your changes.
• Pre-Change Policy Analysis—Enables you to evaluate the impact of a new rule and analyze the
intent of the new rules against the rules that already exist to recommend how to best meet the
intent.
• Post-Change Policy Analysis—Enables you to clean the existing rulebase by identifying
Shadows, Redundancies, and other anomalies that have accumulated over time.
Policy Analyzer supports both Strata Cloud Manager and Panorama deployments. See Policy
Analyzer to learn more.
Strata Cloud Manager Getting Started 504 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Try out Policy Optimizer while it’s available for early access. If you’re interested in
continuing to use this future beyond the early access period, check in with your account
team.
Rules that are too broad introduce security gaps because they allow traffic that isn't in use in your
network. Policy Optimizer enables you to convert these overly permissive rules to more specific,
focused rules that only allow the applications you’re actually using.
Policy Optimizer supports only deployments managed by Strata Cloud Manager, including
NGFW and Prisma® Access configurations.
Strata Cloud Manager analyzes log data and flags rules as overly permissive if they are at least
15 days old and have "any" specified in the source address, destination address, source user, or
application fields.
For rules identified as overly permissive, Strata Cloud Manager auto generates recommendations
you can accept to optimize the rule. The new, recommended rules are more specific and targeted
than the original rule; they explicitly allow only the applications that have been detected in your
network in the last 90 days.
Select an overly permissive rule to review, adjust, and accept optimization recommendations.
Replacing these rules with the more specific, recommended rules strengthens your security
posture.
Accepting recommendations to optimize a rule does not remove the original rule. The original rule
remains listed below the new rules in your Security policy so you can monitor the rule and remove
it when there is zero traffic hit on the original rule. Policy Optimizer process runs daily and you
can see the timestamp of the last successful process run at the top-right corner of the Policy
Optimizer page. Both the original rule and optimized rules are tagged so you can easily identify
them in your Security policy.
Strata Cloud Manager Getting Started 505 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Policy Optimizer analyzes rules that are at least 15 days old for optimization. You can customize
the policy rule analysis lookback period between 15 and 90 days in the Policy Optimizer settings
to align with your security posture requirements. To adjust the lookback period, go to Policy
Optimizer, open the Policy Optimizer Settings at the top-right corner of the page, and enter a
value between the default 15 days and the maximum 90 days.
Strata Cloud Manager Getting Started 506 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• Policy Optimizer does not support address group creation if the recommendations include:
• A combination of IP addresses and existing address or address group objects.
• Existing address objects.
• Both IPv4 and IPv6 addresses.
• The check box for creating address groups in the side panel isn’t selected by default for rules in
the global scope.
• When you perform multiple actions such as deleting users, user groups, applications, or
application groups on the same optimized rule where you created an address group, Policy
Optimizer might reset or remove the address group. To avoid this, make all edit changes before
you add the address group.
• A validation error doesn’t appear if the address group name is a duplicate or if an address
object with the same name already exists.
• User or user groups are supported only if the user or user groups data in CIE is approximately
50,000 user-ids/user groups or fewer.
• Policy Optimizer does not consider security policy rules based on snippets for optimization.
Optimize a Rule
STEP 1 | Go to Manage > Security Posture > Policy Optimizer.
The Ready for Optimization tab lists all overly permissive rules for which recommendations are
available. These rules are sorted by traffic volume, with the highest-hit rules appearing first.
Review the overly permissive rules and select one to view its optimization recommendations.
If multiple such rules exist, prioritize optimizing those with the highest traffic impact to achieve
the most significant improvements in your security posture. You can remove a rule from
optimization to prevent the Policy Optimizer from processing it. The rule settings remain as is.
Strata Cloud Manager Getting Started 507 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
All the rule recommendations suggested by Policy Optimizer are prepended by optrule and
appended by an integer.
Strata Cloud Manager Getting Started 508 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Strata Cloud Manager Getting Started 509 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
groups within recommended rules, allowing you to adjust and preview suggested groups
before accepting recommendations.
The address group retains the original configuration scope. You can change it to the
global configuration scope by checking the check box.
After you accept the optimized rules, you’ll be prompted to Update Rulebase. When you
agree, the optimized rules are added to your Security policy. However, they’re not yet
enforcing traffic.
When multiple uncovered public networks remain, Policy Optimizer uses negated RFC-1918
ranges. To make recommendations that are clear and manageable, it identifies existing address
objects, groups, or standard subnets to suggest in the address fields. For example, instead of
recommending 1,000 individual source IP addresses seen in traffic, Policy Optimizer suggests
an address object like “user-addresses” (e.g., 10.5.0.0/16) if it matches, or a standard private
subnet like RFC-1918 10.0.0.0/8. For public IPs, however, matching objects or groups are
less likely to be defined in the configuration. If Policy Optimizer encounters a wide variety
of public IPs and can't suggest a small set of public subnets, it defaults to recommending all
public IPs, represented by negation of RFC-1918, where the three standard private subnets
are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
After optimizing a security rule, Policy Optimizer will not reselect it for further
optimization for the next 90 days. This prevents redundant recommendations
on the same traffic, which may no longer be applicable after implementing other
recommended rules. Policy Optimizer waits 90 days because the 90 days period
corresponds to the maximum look back period for log analysis.
Strata Cloud Manager Getting Started 510 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
STEP 4 | Push Config to send the configuration updates and start enforcing the optimized rules.
STEP 5 | Monitor the original rule until you’re confident that you don't need it.
The original, overly permissive rules remain in your Security policy; it’s listed below the
optimized rules in your rulebase and is tagged so you can easily identify it. The tag name
appends _original to the rule name (for example, security-rule-name_original).
Strata Cloud Manager Getting Started 511 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• If the traffic logs don’t contain the source user data, Policy Optimizer recommends unknown
for the Source User field.
If the original rule specified certain users, Policy Optimizer makes sure that the new optimized
rule will not allow additional users than the original rule. It will only refine the rule to be more
specific.
• If there are too many individual users in the source user field, Policy Optimizer may
recommend known-users to simplify the rule while maintaining least-privilege access.
• A minimum threshold of 75% is required to associate individual users with a user group. This
means that at least 75% of the user group's resolved user IDs must be present in the log data
for the user group to be considered in the recommendations.
You can click Users to view the list of users in a side car panel.
Policy Optimizer provides contextual logs to offer insights into the traffic triggering the rule with
an unknown user. For recommendations where the source user is unknown, click Unknown User
to open Log Viewer.
Strata Cloud Manager Getting Started 512 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Strata Cloud Manager Getting Started 513 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Make sure to Push Config after moving a rule to the exclusion list; after pushing the configuration,
it can take up to 24 hours for the rule to display on the list. You can always choose to add the rule
back to the optimization list later.
Under Optimization Failed, you can also view the rules that failed optimization and check the
reason for failure.
Strata Cloud Manager Getting Started 514 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Strata Cloud Manager Getting Started 515 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
To streamline your configuration, use the Config Cleanup feature, which helps you to identify and
remove unused configuration objects and policy rules. It also detects objects within security policy
rules that have not matched any traffic.
By reducing configuration clutter, Config Cleanup ensures that only essential configuration
objects are retained, improving the overall efficiency and maintainability of your security policies.
Role-based access control (RBAC) governs access to Config Cleanup operations. Your assigned
role determines the actions you can perform:
• Administrators can delete unused objects, disable or delete policy rules that have not matched
any traffic, and delete objects within rules that have not seen traffic matches.
• Users may see a limited view and can perform only the actions allowed by their RBAC
permissions.
Config Cleanup supports only deployments managed by Strata Cloud Manager, including
NGFW and Prisma Access configurations.
Strata Cloud Manager Getting Started 516 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
were introduced, unused objects increase configuration size and can lead to longer commit
times. Regularly review and delete these objects to maintain a clean and efficient configuration.
• Zero Hit Objects are objects within security policy rules that have not matched any traffic.
Their presence can make rules overly permissive and increase the attack surface, even if the
same objects are used in other policies. Removing zero-hit objects from specific rules helps
Strata Cloud Manager Getting Started 517 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
harden the policy rule and improve overall security posture. You can view a list of all rules
containing zero-hit objects under Zero Hit Objects.
Config cleanup calculates zero-hit objects based on traffic logs sent to Strata Logging
Service. If the firewall does not send logs to Strata Logging Service or if logging is
disabled for a rule, the computation may be incomplete or inaccurate.
To see all objects with zero hits in a specific rule, select the rule to open its side panel. Within
the side panel, you can select and delete any objects that have zero hits.
Strata Cloud Manager Getting Started 518 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• Zero Hit Policy Rules are security policy rules that have not matched any traffic for at least one
day. A rule may stop matching traffic due to modifications, the addition of new rules that take
precedence, or changes in the traffic patterns. Regularly review zero-hit rules to determine
Strata Cloud Manager Getting Started 519 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
whether to remove them or reposition them within the policy. This recommended practice
helps maintain a clean and efficient security policy configuration.
Use filters and other controls to refine your view and target specific unused objects and policy
rules.
• Unused Objects – Filter unused objects by:
• Name – Search for and select a specific configuration object by name.
• Object Type – Select the type of configuration object.
• Days Unused – Choose from predefined time ranges (30+ days, 60+ days, 90+ days) or use
the customizable More than option for more granular filtering.
• Zero Hit Objects – Filter policy rules based on:
• Days with Zero Hits – Select from predefined ranges (30+ days, 60+ days, 90+ days) or use
the More than option to identify objects within rules that haven't matched traffic within the
specified timeframe. Use this filter to locate and remove objects that no longer meet traffic
thresholds.
• You can also apply filters to additional columns, such as source zone, destination zone/
address, source user, or URL category, to further refine your search for rules.
Strata Cloud Manager Getting Started 520 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• Zero Hit Policy Rules – Filter, enable, disable, or delete zero-hit policy rules using any available
column as a filter.
Strata Cloud Manager Getting Started 521 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• , including those funded by Software • One of these licenses that includes access
NGFW Credits to Strata Cloud Manager:
• Prisma Access
•
Strata Cloud Manager leverages a set of predefined Best Practice Checks that align with industry-
specific standard cybersecurity controls, such as CIS (Center for Internet Security), and NIST
(National Institute of Standards and Technology) and custom checks you create based on the
specific needs of your organization. These checks evaluate configurations and settings within the
cloud infrastructure, identifying deviations from best practices or compliance requirements.
The security posture checks in Strata Cloud Manager encompass a range of security domains,
including network security, data protection, and identity and access management. These
checks assess firewall rules, encryption, authentication mechanisms, and the overall integrity of
configurations.
When your configuration detects deviations, Strata Cloud Manager provides actionable insights
and remediation recommendations, and can even automate some parts of the process for
correcting misconfigurations and noncompliant settings to help you maintain a secure and
compliant cloud environment with minimal manual intervention.
Security posture settings bring together the functionality of both the AIOps and Strata Cloud
Manager security check settings pages.
Select Manage > Security Posture > Settings to view, manage, and customize security posture
checks for your deployment to maximize relevant recommendations.
Strata Cloud Manager Getting Started 522 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• Security Checks – List of the best practice checks that are used to evaluate your configuration.
Your configuration is compared against these checks to assess the security posture of your
devices and to generate security alerts. You can perform the following actions to manage these
checks based on your environment:
1. Set the severity level for your custom checks to identify the checks that are the most critical
to your deployment.
You can change the severity level for your custom checks, but the severity levels for
Palo Alto Networks Best Practice Checks are fixed and can't be changed.
2. Create and delete your own custom checks, clone and edit existing checks to create new
ones, and make special exceptions for checks that you don't want applied to portions of
your deployment.
As part of the initial rollout of these checks, you can clone checks that are in the
custom check framework.
3. Set the response when a check fails.
• Alert (default)—Raises an alert for the failed check.
• Block—Stop potential misconfigurations before they enter your deployment. Block can
mean any of the following depending on how you manage it:
• Inline Checks on Strata Cloud Manager—Prevents you from committing or pushing
a noncompliant configuration, but won't prevent you from saving your configuration
locally.
• Real-Time* Inline Checks on Strata Cloud Manager—Prevents you from even saving a
noncompliant configuration.
• Panorama Managed**—Prevents you from committing a noncompliant configuration
to Panorama but won't prevent you from saving it to the Panorama candidate
configuration.
• PAN-OS Web Interface, API, or CLI management—Block has no enforcement effect
on configurations that are not either managed by Strata Cloud Manager or Panorama.
• *Due to their logical complexity, some inline checks are run asynchronously
on a fixed schedule but not in real time. A failure of a real-time check in your
configuration will prevent you from saving that configuration, even locally.
• **The Panorama CloudConnector Plugin is required to enforce the block
commit action on Panorama.
Strata Cloud Manager Getting Started 523 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Strata Cloud Manager Getting Started 524 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Strata Cloud Manager Getting Started 525 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
STEP 3 | Edit the check you cloned and skip to step ➡5 to make your changes.
STEP 4 | Go to Manage > Security Posture > Settings, and select Create Custom Check.
STEP 5 | Specify the General Information for your check. Your custom check must have a Name and
a Description, but you should also add a Recommendation and a Rationale for your check to
help others understand the intent of and best practice for your custom check.
STEP 6 | Optional Select an Object Type– the section of your configuration for which you're creating
a check that determines which Rule Properties to Match you can choose when creating your
check.
Strata Cloud Manager Getting Started 526 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• None of
2. Add Condition–Use logical operators (such as AND, OR, IF, THEN, ELSE, and ELSE IF) to
connect or combine expressions, additional conditions, and groups.
3. Add Group–Create a set of expressions, conditions, or both. This group, taken together,
results in a True or False condition.
The expression in this example issues a warning when it sees policy rules that allow Okta
traffic to and from Russian IP addresses. The example simply illustrates how the logic
builder works, and isn't intended to be a recommendation.
Strata Cloud Manager Getting Started 527 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
STEP 2 | Specify the information needed to Create Exception Rule for your check. Provide a name, a
reason, and conditions for your exception.
The Security Check Exception feature is currently only applicable to alerts, and the
Best Practices and Security Posture Insights dashboards.
STEP 3 | Optional Add a Ticket Number or a Description for your exception to help others
understand the intent and history behind for your exception.
Strata Cloud Manager Getting Started 528 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
• Create and manage your policy rules–Security policy rules allow you to enforce rules and take
action, and can be as general or specific as needed. (Manage > Configuration > NGFW and
Prisma Access > Security Services > Security Policy)
If the configuration you're trying to save does not pass your criteria to pass, you will have the
option to remediate the issue, or override* the warning and save your changes anyway.
Strata Cloud Manager Getting Started 529 ©2025 Palo Alto Networks, Inc.
Manage:Security Posture
Strata Cloud Manager Getting Started 530 ©2025 Palo Alto Networks, Inc.
Manage: Access Control
Where Can I Use This? What Do I Need?
Role-based access control (RBAC) enables you to define the privileges and responsibilities of
administrative users (administrators). Every administrator must have a user account that specifies
a role and authentication method. Prisma Access Managed by Strata Cloud Manager implements
custom RBAC, to enable you to manage roles or specific permissions, and assign access rights to
administrative users. Using RBAC, you can manage users and their access to various resources
within Managed by Strata Cloud Manager.
RBAC is not supported for SaaS Security Inline and Behavior Threats. All tabs under
Discovered Apps and Behavior Threats are visible to all users, regardless of their assigned
roles.
531
Manage: Access Control
Administrator Roles
Your role determines your access and permissions on the service. When you assign a role, you
define the permission group and account groups the administrator can manage. Prisma Access
includes the following built-in permission groups for administrators.
• App Administrator—Has full access to the given app, including all instances added to the app
in the future. App Administrators can assign roles for app instances, and they can also activate
app instances specific to that app.
• Instance Administrator—Has full access to the app instance for which this role is assigned.
The Instance Administrator can also make other users an Instance Administrator for the app
instance. If the app has predefined or custom roles, the Instance Administrator can assign those
roles to other users.
• Super Reader—Can view all config elements, logs, and settings. Super Readers can’t make
changes to other settings.
• Audit Admin—Can view and manage logs and log settings only. Audit Admins can’t make
changes to other settings.
• Crypto Admin—Can view logs, and manage cryptographic settings such as IKE, IPSec, master
key management, and certificate configuration. Crypto Admins can’t view or make changes to
other settings.
• Security Admin—Can view logs and manage all settings except the cryptographic settings that
are available to the Crypto Admin role.
• Web Security Admin—Can view configuration elements related to Web Security only.
• Data Loss Prevention Admin—Can access Enterprise DLP settings but cannot push
configuration changes to Prisma Access.
• Data Security Admin—Can access Enterprise DLP and SaaS Security controls, but cannot push
configuration changes to Prisma Access.
• SaaS Admin—Can access SaaS Security settings but cannot push configuration changes to
Prisma Access.
Strata Cloud Manager Getting Started 532 ©2025 Palo Alto Networks, Inc.
Manage: Access Control
STEP 3 | Assign a Predefined Role to a Tenant User or Service Account Through Common Services
If you already added users and want to add additional roles, you can also assign a batch of
predefined roles. Review additional information about roles and permissions.
STEP 4 | Create a New Scope in the Prisma Access Managed by Strata Cloud Manager UI
Prisma Access Managed by Strata Cloud Manager enables you (as an administrator) to assign
a management scope to other Strata Cloud Manager users (non-administrator) to associate
permissions based on scopes such as folders and snippets.
The permissions are actions that are allowed in the system. Permissions represent a specific
set of application programming interface (API) calls that you use to read, write, and delete
objects within the systems. All permissions are grouped into roles.
Strata Cloud Manager Getting Started 533 ©2025 Palo Alto Networks, Inc.
Manage: Access Control
Configure scope management to enforce custom role-based access control. This allows
you to specify which Strata Cloud Manager administrators can access and modify specific
folders, firewalls, Prisma Access deployments, and snippet configurations. Defining the scope
management for your cloud admins ensures they aren’t overprovisioned and defines the read
and writing access privileges for the selected folders, firewalls, Prisma Accessdeployments, and
snippet configurations. The Common Services Multiple Platform and Enterprise Roles are used to
define the read and write access privileges for a Strata Cloud Manager admin.
The Scope management configuration is defined across your entire Strata Cloud Manager tenant.
Scope management can’t be defined for a specific folder, Prisma Access, or firewall Configuration
Scope.
Only a Strata Cloud Manager administrator with a Superuser, Multitenant Superuser, IAM
Administrator, Multitenant IAM Administrator, or Business Administrator role can create a
scope object. The Scope Management widget is not available for users with other roles.
Strata Cloud Manager Getting Started 534 ©2025 Palo Alto Networks, Inc.
Manage: Access Control
Selecting a firewall also includes the folder that the selected firewall is
associated with in the scope management configuration. Only the immediately
associated folder is included, and not the parent folder.
3. Select Snippets and check (enable) the snippets you want to include.
4. Add the scope object.
Strata Cloud Manager Getting Started 535 ©2025 Palo Alto Networks, Inc.
Manage: Access Control
STEP 5 | Apply the scope management configuration to Strata Cloud Manager admins.
1. Assign Users to the Scope Object you created in the previous step.
2. Select a Role for the Strata Cloud Manager admin. For example, you can select MSP
Superuser for a user who needs access to all functions for all tenants.
Default is None. See the Common Services Multiple Platform and Enterprise Roles for
more information about the read and write access privileges for each available Role.
Select a specific Strata Cloud Manager admin and Clear Role to remove the
currently assigned Common Services role. This applies the default None role to
the admin.
3. To modify an existing scope to edit the name, and to add or remove folders, select the
scope object, modify the scope as needed, and Update the scope.
4. To modify the assigned users, to add more users or change the users, click Assigned
Users and modify as needed, and Close the window.
Strata Cloud Manager Getting Started 536 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Where Can I Use This? What Do I Need?
When you first navigate to your workflows, the Discovery dashboard surfaces critical and
recommended actions you can take to improve security posture or optimize your configuration
management, as soon as they're available to you. Continue on here to set up and onboard NGFWs
and Prisma Access mobile users and remote networks, and plan software upgrades for NGFWs.
• Discover Onboarding Tasks
• Set Up Prisma Access
• Set Up NGFWs
• Set Up Prisma SD-WAN
• Software Upgrades (NGFW)
• Software Upgrades (Prisma Access)
537
Workflows: Strata Cloud Manager
Workflows: Discovery
Where Can I Use This? What Do I Need?
• license or license
•
•
Discovery is where you can start critical and recommended tasks as soon they become available.
There may be guided workflows or tasks you can complete on your own. In this topic, we’ll show
you how to use the guided workflow to create your folder structure and assign devices to them,
effortlessly and intuitively.
Strata Cloud Manager Getting Started 538 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
STEP 2 | Choose how you want to share your policy rules and configurations.
• By Functions of Firewall – Does your organization have different policies for data centers,
branches, and internet gateways? This might be the option for you.
• By Region – Does your organization span regions that have different rules or comply with
different laws? Consider this option.
• Mix of Functions & Regions – Does your cross-region organization want to separate
policies for different data centers, branches, and internet gateways? Give this option a try.
• I have my own way – If none of the above examples are suitable for your use case, you can
also build a device architecture according to your own situation.
For this example, we'll choose the I have my own way option.
Turn on Show Tips to see help tips to help you make an informed decision.
Strata Cloud Manager Getting Started 539 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
STEP 4 | Use the following actions to build your folder structure based on the template you selected
in step 1. You can:
• Add a new Folder – Hover your cursor over a folder to show the option to add a new
folder. Click , and then name your new folder.
• Delete Folder – Hover your cursor over a folder to show the option to delete the folder.
Select to delete the folder.
• Rename Folder – Double-click on a folder to type a new for the folder. Press the enter key
or click outside of the text field for your new name to take effect.
• Expand or Collapse folder nodes that have children.
Strata Cloud Manager Getting Started 540 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
STEP 7 | Select Assign To, choose a folder you want to assign your firewalls to, and then select Apply.
Cloud management is enabled for firewalls you assign to a Cloud Managed folder.
Strata Cloud Manager Getting Started 541 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
You'll see the folders you created and the firewalls you assigned on the main Discovery page,
as well as under the NGFW Setup > Folder Management tab.
Strata Cloud Manager Getting Started 542 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
As part of setting up your NGFWs, you will need to Onboard your Next-Generation firewalls
to Strata Cloud Manager. Onboarding includes setting up folders and Device Labels to group
firewalls that require similar settings. Learn more about Workflows: Folder Management, and use
the Device Management page to view details for all devices that are in your folder hierarchy.
STEP 1 | Activate Strata Logging Service and AIOps for NGFW Premium licenses.
The Strata Logging Service license is required for logging and the AIOps for NGFW Premium
license is required for cloud management of NGFW.
STEP 4 | (HA only) Configure your managed firewalls in a high availability (HA) configuration if
needed.
STEP 7 | Create and configure the network and policy rule configuration.
STEP 8 | Push configuration changes from Strata Cloud Manager to your managed firewall.
Strata Cloud Manager Getting Started 543 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
A Palo Alto Networks NGFW that is managed by Strata Cloud Manager is called a Cloud Managed
Device. Strata Cloud Manager can manage firewalls running PAN-OS 10.2.3 or newer.
For more information about prerequisites for Strata Cloud Manager, click here.
With the Device Management dashboard (Workflows > NGFW Setup > Device Management)
you can review important device and version details about all your managed devices and select
which devices to move to cloud management.
Strata Cloud Manager Getting Started 544 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Software Version | App and Displays the software and content versions that are
Threat | Antivirus | URL Filtering currently installed on the firewall. For details, see Firewall
Software and Content Updates.
Device Dictionary A file for firewalls to import. The dictionary file provides
the Strata Cloud Manager and firewall administrator with
a list of device attributes for selection when importing
recommended security policy rules.
For more information about the onboarding process for Strata Cloud Manager, click here.
You can use the available devices tab to move devices in and out of Strata Cloud Manager.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Workflows > NGFW Setup > Device Management > Available Devices.
1. Select Back to Available Devices to move a firewall out of Strata Cloud Manager.
Strata Cloud Manager Getting Started 545 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
STEP 2 | Select Workflows > NGFW Setup > Device Management, then select Local Configuration
Management from the available Actions.
STEP 4 | Click Yes to replace the current local configuration on the firewall with the selected version
You can use the Jobs view to troubleshoot failed operations, investigate warnings associated
with completed commits, or cancel pending commits.
STEP 2 | Select Workflows > NGFW Setup > Device Management > Cloud Managed Devices.
STEP 5 | Remove the old device from your support portal account.
Strata Cloud Manager Getting Started 546 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
• license
• license
Folders are used to logically group your firewalls or deployment types (Prisma Access mobile
users, remote networks, or service connections) for simplified configuration management. You
can create a folder that contains multiple nested folders to group firewalls and deployments that
require similar configurations. Folders that are already nested can have multiple nested folders as
well.
Folders for Prisma Access and your NGFWs are separate; you can't group NGFWs in a folder with
Prisma Access deployments. However, you can easily apply shared settings globally across all
folders or use Manage: Snippets to easily apply standard settings and policy requirements across
multiple folders.
Strata Cloud Manager Getting Started 547 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
• NGFW
• Prisma Access
Strata Cloud Manager Getting Started 548 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Create a Folder
Create a folder to logically group your firewalls for simplified configuration management. You can
create a folder under the default Firewalls folder or under another existing folder.
STEP 1 | Log in to Strata Cloud Manager.
STEP 2 | Select Workflows > NGFW Setup > Folder Management and Add Folder.
Strata Cloud Manager Getting Started 549 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Modify a Folder
Modify an existing folder to edit the name, description, and to add or change the labels.
Additionally, you can move or delete the folder as needed.
STEP 1 | Log in to Strata Cloud Manager.
Strata Cloud Manager Getting Started 550 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
STEP 2 | Select Workflows > NGFW Setup > Folder Management and expand the Actions menu.
Strata Cloud Manager Getting Started 551 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Strata Cloud Manager Getting Started 552 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
You can set up branch sites, data center sites, and ION devices in Prisma SD-WAN using Strata
Cloud Manager.
Select Workflows > Prisma SD-WAN Setup.
You can set up workflows for:
• Branch Sites
Set up branch sites in your network using the Branch Sites tab. An enterprise can have one
or more branches within a network. When you create a branch, you can select a default
domain and set of policy rules and configure WAN networks, circuit categories, circuit
labels, and circuit specifications.
• Data Centers
Set up data center sites in your network using the Data Centers tab. Data center sites are
connected to branch sites and you can host enterprise applications and services in a data
center.
• Devices
Set up ION devices in your network using the Devices tab. ION devices can be deployed
at a branch site or a data center site. These are available in both hardware and software
form factors that meet the needs of any location and any deployment scenario. You have to
connect, claim, assign, and configure the ION devices for your branch and data center sites.
Strata Cloud Manager Getting Started 553 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
• license
Select Workflows > Prisma Access Setup to start setting up your Prisma Access.
• Set up the service infrastructure to enable communication between your remote network
locations, mobile users, and the HQ or data centers that you plan on connecting to
Prisma Access over service connections. A service connection provides connectivity to the data
center.
• Onboard mobile users and determine how you're connecting them to Prisma Access.
• Onboard remote networks to secure remote network locations, such as branches, and users in
those branches. A next-generation firewall or a third-party, IPSec-compliant device including
SD-WAN that can establish an IPSec tunnel to the service is required at the remote site.
• Add service connections to enable both mobile users and users at your branch networks to
access resources in your headquarters (HQ) or data center (DC). Beyond providing access to
corporate resources, service connections allow your mobile users to reach branch locations.
• license
Before you can use Prisma Access to secure your remote networks and mobile users, you must
configure an infrastructure subnet.
Prisma Access uses the subnet to create the network backbone for communication between your
branch networks, mobile users, and the Prisma Access security infrastructure, as well as with the
HQ and data center networks you plan to connect to Prisma Access over service connections.
If you use dynamic routing for your remote networks or service connections, you must also
configure an RFC 6696-compliant BGP Private AS number.
Use the following recommendations and requirements when you add an infrastructure subnet for
Prisma Access.
• Use an RFC 1918-compliant subnet. While Prisma Access supports the use of non-RFC 1918-
compliant (public) IP addresses, it's not recommended due to possible conflicts with the
internet public IP address space.
• Don't specify any subnets that overlap with 169.254.169.253, 169.254.169.254, and the
100.64.0.0/10 subnet range because Prisma Access reserves those IP addresses and subnets
for its internal use. This subnetwork is an extension to your existing network and therefore
can't overlap with any IP subnets that you use within your corporate network or with the IP
address pools that you assign for Prisma Access for Users or Prisma Access for Networks.
Strata Cloud Manager Getting Started 554 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Because the service infrastructure requires a large number of IP addresses, you must designate
a /24 subnetwork (for example, 172.16.55.0/24).
• Enter an Infrastructure subnet that Prisma Access can use to enable communication between
your remote network locations, mobile users, and the HQ or data centers that you plan on
connecting to Prisma Access over service connections. Use an RFC 1918-compliant subnet for
the infrastructure subnet.
See Prisma Access Setup for more information.
• license
license
Before configuring mobile users, ensure that you have the required licenses (Prisma Access
license for mobile users and a Strata Logging Service license with proper firewall storage space).
If mobile users will be connecting to other connected networks, you will need either the Zero
Trust Network Access (ZTNA) or Enterprise Edition Prisma Access license that will provide the
corporate access node (CAN) necessary to connect.
You will first choose your connection type, or you may use both GlobalProtect, explicit proxy, or
both. For both connection types, there are only a few required settings that you need to fill out
initially to enable Prisma Access to provision your mobile users' environment.
Strata Cloud Manager Getting Started 555 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
• license
As you prepare to connect remote networks to Prisma Access, you will need to know how many
sites you will onboard. This information will help you determine connectivity requirements
such as how to route traffic through Prisma Access. As you're planning your remote network
deployment, you will need to know which applications will pass through Prisma Access in order to
appropriately configure the best Security policy rules. Equally important is establishing your threat
Strata Cloud Manager Getting Started 556 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
profile configuration. Additionally, you will want to consider having consistent threat, URL, and
WildFire scanning applied to all rules for a consistent threat mitigation strategy.
For more information, see Prisma Access Remote Networks.
• license
Service connections enable both mobile users and users at your branch networks to access
resources in your headquarters (HQ) or data center (DC). Beyond providing access to corporate
resources, service connections allow your mobile users to reach branch locations.
Select Workflows > Prisma Access Setup > Service Connections, to add a service connection.
The first tunnel you create is the primary tunnel for the service connection. Repeat this workflow
to optionally set up a secondary tunnel. When both tunnels are up, the primary tunnel takes
priority over the secondary tunnel. If the primary service connection tunnel goes down, the
connection falls back to the secondary tunnel until the primary tunnel returns. Based on the IPSec
device you use to establish the tunnel, Prisma Access provides built-in, recommended IKE and
IPSec security settings. You can use the recommended settings to get started or customize them
as needed for your environment.
For more information, see Prisma Access Service Connections.
5.0 Innovation
Prisma Access license with the Mobile
Users or Remote Networks license
subscription
Remote Browser Isolation license
Remote Browser Isolation (RBI) by Palo Alto Networks is a solution that isolates and transfers all
browsing activity away from your user's managed devices and corporate networks to an outside
entity such as Prisma Access, which secures and isolates potentially malicious code and content
within their platform.
Natively integrated with Prisma Access, RBI allows you to apply isolation profiles easily to existing
security policies. All traffic in isolation undergoes analysis and threat prevention provided by
Cloud-Delivered Security Services (CDSS) such as Advanced Threat Prevention, Advanced
WildFire, Advanced URL Filtering, DNS Security, and SaaS Security.
As you prepare to onboard your users to RBI, consider what URL categories you want to enable
for isolated browsing by your users. Think about what browser actions you want to prohibit your
Strata Cloud Manager Getting Started 557 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
users from performing, such as copy and paste functions, keyboard inputs, and sharing options
like uploading, downloading, and printing files.
For more information, see Remote Browser Isolation.
Strata Cloud Manager Getting Started 558 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Use Strata Cloud Manager to plan and manage your software upgrades for NGFW and Prisma
Access. Here are the workflows that you can perform:
• Upgrade Recommendations: Create upgrade recommendations to determine the best software
version for your devices that can be upgraded. Software Upgrade Recommendations analyzes
the features enabled on firewalls and provides a customized recommendation.
• Prisma Access Upgrade Dashboard: Choose a preferred time window for certain Prisma Access
upgrades.
• NGFW - Scheduler: Schedule a PAN-OS software update to upgrade or downgrade your
firewalls to a target PAN-OS version at a date and time of your choosing.
• NGFW
• Prisma Access
Upgrade Recommendations
In Workflows > Software Upgrades > Upgrade Recommendations, you can create
recommendations to determine the best software version for your devices that can be upgraded.
Software Upgrade Recommendations analyzes the features enabled on firewalls and provides a
customized recommendation that includes:
• Best software version for your devices that you can upgrade.
• Information about new features, changes to behavior, vulnerabilities and software issues in
each recommended software version.
The types of upgrade recommendations are:
• System-generated recommendations that are generated every week and contain the suggested
upgrade options.
Strata Cloud Manager Getting Started 559 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
• User-generated custom recommendations that are generated based on the selected devices for
specific CVEs in Security Advisory Summary.
• User-generated recommendations that are generated based on the upload of a Tech Support
File (TSF) of a firewall.
Strata Cloud Manager Getting Started 560 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
• You can upload TSF of only one device at a time and it must be TSF in the .tgz file
format.
• Software Upgrade Recommendations supports TSF from devices with the PAN-OS
version 9.1 or above for report generation.
4. View the software upgrade recommendations after the status is displayed as Ready. You can
also check the Status column to see if there are any errors related to the upload, file format, or
processing of the TSF file.
Strata Cloud Manager Getting Started 561 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
You can:
• Understand the Prisma Access dataplane upgrade process.
• Choose your upgrade preferences:
Select a tenant name to choose your upgrade preferences. For more information, see Choose a
Preferred Window for Certain Prisma Access Upgrades.
Strata Cloud Manager Getting Started 562 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Select Workflows > Prisma Access Setup > Prisma Access Browser to start onboarding your
Prisma Access Browser.
Prisma Access Secure Enterprise Browser (Prisma Access Browser) is the only solution that
secures both managed and unmanaged devices, through a natively integrated enterprise browser
that extends protection to unmanaged devices. See What is the Prisma Access Browser?
Onboarding is a series of steps where you'll configure the following items:
• User authentication and groups
• Prisma Access Integration
• Routing
• Enforce SSO Applications
• Download and Distribute
• Browser Policy
Onboard Prisma Access Browser on the Strata Cloud Manager.
Strata Cloud Manager Getting Started 563 ©2025 Palo Alto Networks, Inc.
Workflows: Strata Cloud Manager
Strata Cloud Manager Getting Started 564 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
Where Can I Use This? What Do I Need?
Get reports on the network traffic patterns, bandwidth utilization, and your security subscription
data in Strata Cloud Manager. Reports provide actionable insight into your network that you can
use for planning and monitoring purposes.
Reports are supported on certain Prisma Access and NGFW dashboards, Activity Insights
overview, and Prisma SD-WAN. Prisma Access and NGFW users who have full access to use the
dashboard, can download dashboard data as PDFs, share the report within their organization, and
schedule reports to get delivered to their email inbox at regular intervals. Reports are a licensed
subscription service in Prisma SD-WAN. You can download and view reports from controllers,
across sites, and circuits in Prisma SD-WAN.
View these reports in Strata Cloud Manager:
• Prisma Access and NGFW - You can generate reports from the Prisma Access and NGFW
dashboards and Activity Insights. These icons in the top right of the dashboard indicate
that reports are supported for this dashboard. You can also generate, download, share, and
schedule reports directly from the Reports menu.
• Prisma SD-WAN - View the following WAN Clarity reports:
• WAN Clarity Branch Reports
• WAN Clarity Data Center Reports
• Aggregate Bandwidth Usage Reports
• SaaS Risk Assessment Report - Use the SaaS Risk Assessment Report to proactively identify
problems with how assets are stored and shared across all applications secured by Data
Security and take action to reduce exposure.
• GDPR Report - The GDPR Report summarizes evidence related to the data privacy regulations
for your sanctioned SaaS applications on Data Security.
565
Reports: Strata Cloud Manager
The SaaS Risk Assessment and GDPR reports have been migrated from SaaS Security >
Data Security > Reports to Strata Cloud Manager > Reports.
Strata Cloud Manager Getting Started 566 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
Or
Click Strata Cloud Manager > Reports > Generate Reports/Overview and select any of these
icons from the list of report formats. By default, reports are generated with the last
24 hours data or 30 days data based on the type of dashboard for which you are generating
report. You can customize the time period for which you want to gather data in the report
when scheduling the report.
Strata Cloud Manager Getting Started 567 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
STEP 2 | If you’re scheduling a report, you’ll need to continue to define the report parameters
including:
• the Time Period for which to gather data
• the Recurrence, which is the frequency at which you’d like the report to be delivered (daily,
weekly, or monthly)
You can view, edit, or delete all the scheduled reports from the Strata Cloud Manager >
Reports > Scheduled Reports tab.
Strata Cloud Manager Getting Started 568 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
GDPR Report
The GDPR Report summarizes evidence related to the data privacy regulations for your
sanctioned SaaS applications on Data Security. Access to the report depends on your team and
your administrator role permissions:
• GDPR link is hidden if you do not have Report permissions.
• GDPR report only includes cloud apps for which you have Team permissions.
The report provides actionable intelligence around sensitive data exposure, user activities, your
security posture, and the personal data that resides on your applications; however, the report
does not provide a verdict for compliance.
You can export the report to help your GDPR regulator review how you collect, use, and share PII
data across your SaaS applications. For example, you can generate a report to view the number
of records transferred to a third country or an international organization, or to learn which
sanctioned applications are sharing data externally.
STEP 1 | To download, share, or schedule a report, select Strata Cloud Manager > Reports > Report
Templates > GDPR and choose the required action.
View the report and review evidence identified and possible compliance issues.
STEP 3 | Select the Scheduled Reports tab to view the reports that have been scheduled to generate.
You can choose to delete a scheduled report or edit the schedule.
STEP 4 | Select the History tab to view the list of reports generated in the past.
Strata Cloud Manager Getting Started 569 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
STEP 2 | Select the Scheduled Reports tab to view the reports that have been scheduled to generate.
You can choose to delete a scheduled report or edit the schedule.
STEP 3 | Select the History tab to view the list of reports generated in the past.
Strata Cloud Manager Getting Started 570 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
STEP 3 | Select a Time Range and select any of the following in the Report for field.
• Branch
• Data Center
• Aggregate Bandwidth Usage
Strata Cloud Manager Getting Started 571 ©2025 Palo Alto Networks, Inc.
Reports: Strata Cloud Manager
Strata Cloud Manager Getting Started 572 ©2025 Palo Alto Networks, Inc.
Favorites: Strata Cloud Manager
Where Can I Use This? What Do I Need?
The Favorites feature enables you to save items of interest and then quickly access them when
needed from any location in Strata Cloud Manager. You can personalize your favorite menu item
names in your own private list by organizing, editing, and deleting the content of your list.
Manage your favorites as follows:
• Add Favorites
• View Favorites
• Edit Favorites
• Delete Favorites
573
Favorites: Strata Cloud Manager
Add Favorites
Where Can I Use This? What Do I Need?
If you have menu items or pages in Strata Cloud Manager where you repeatedly need to go, but
you no longer want to search for them or navigate to them, you can save these items to a list of
favorites.
STEP 1 | Navigate to the menu item or page that you want to save.
The very top level menu items cannot be added as favorites. Only sub-menus can be
added as favorites.
Strata Cloud Manager Getting Started 574 ©2025 Palo Alto Networks, Inc.
Favorites: Strata Cloud Manager
View Favorites
Where Can I Use This? What Do I Need?
After you add favorites, you can view your favorites and their original locations.
STEP 1 | Select Favorites.
STEP 3 | The path to the actual location and menu name is displayed.
Clicking the item in your favorites list takes you to its original location.
Strata Cloud Manager Getting Started 575 ©2025 Palo Alto Networks, Inc.
Favorites: Strata Cloud Manager
Edit Favorites
Where Can I Use This? What Do I Need?
After you add favorites, you can edit your favorites to personalize them.
STEP 1 | Select Favorites.
Renaming the item in your favorites list does not rename the original item in its original
location.
Strata Cloud Manager Getting Started 576 ©2025 Palo Alto Networks, Inc.
Favorites: Strata Cloud Manager
Delete Favorites
Where Can I Use This? What Do I Need?
After you add favorites, you can delete favorites from your list.
STEP 1 | Select Favorites.
STEP 3 | Click the icon to delete the favorite from the list.
Deleting the item from your favorites list does not remove the original item from its
original location.
Strata Cloud Manager Getting Started 577 ©2025 Palo Alto Networks, Inc.
Favorites: Strata Cloud Manager
Strata Cloud Manager Getting Started 578 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Where Can I Use This? What Do I Need?
From Settings, you can manage the processes that pertain to all services offered in Strata Cloud
Manager. These processes include:
Subscriptions
View the approved subscriptions for your product.
Manage Subscriptions.
Device Associations
Most often used in device and app onboarding, Device Associations enables you to:
• Associate new devices with a tenant
• Associate apps with your devices
• Manage device and app associations
Get started with Device Associations.
Products
If you have a single tenant environment, view, launch, and manage your products:
• Get product information
• Rename instance
• Manage sharing
• Add a tenant
Get started with Product Management.
Tenants
If you're a managed security service provider (MSSP) or distributed enterprise, you can create
and manage your hierarchy of business organizations and units, represented by tenants. From
Tenants, you can:
• Add a tenant
• Edit a tenant
• Manage tenant licenses
579
Settings: Strata Cloud Manager
• Delete a tenant
• Transition from a single tenant to a multitenant deployment
Get started with Tenant Management.
Audit Logs
View records of all actions initiated by users of Strata Cloud Manager
View Audit Logs.
User Preferences
Customize your preferences to suit your needs. For example, choose your display mode.
Configure User Preferences.
Trusted IP List
Use Trusted IP Lists to restrict access to your applications by specifying IP addresses that are
allowed on a per tenant basis.
Configure a Trusted IP List.
Strata Cloud Manager Getting Started 580 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Under Settings > Audit Logs, you can see a list of actions initiated by users of
Strata Cloud Manager. It provides logs on changes made, the owner of the change, the date and
time of the change, and the description of the change. You can use these logs for compliance and
troubleshooting purposes. You can filter the audit logs by the date range with the capability, by a
user, category, and type of change.
d
Strata Cloud Manager Getting Started 581 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Cloud-delivered applications offer the convenience of accessibility from anywhere in the world.
However, this allows for exposure to risks such as access using stolen credentials, dictionary
attacks, and other forms of brute-force attacks to gain access to the applications.
While Identity and Access Management mitigates some of this risk, you can use Trusted IP Lists
to further restrict access to your applications by specifying IP addresses that are allowed on a per
tenant basis.
By default, during the creation of a new tenant, access is allowed to both the web interface and
the API from any IP address. The Trusted IP List is a list of trusted IP addresses that are allowed
to access a tenant. You can use a Trusted IP List to limit access to a single tenant, or you can use
it to limit access to a parent tenant and its children in a multitenant hierarchy. In a multitenant
hierarchy, you add the Trusted IP List on the parent tenant, the list gets inherited from the parent
tenant to its child tenants, and is enforced from the top-down.
To streamline IP address management, Strata Cloud Manager offers a bulk import feature for
trusted IP addresses. This functionality allows you to upload multiple IP addresses via a CSV file,
significantly reducing the time and effort required for manual entry. The default limit is set to 100
IP addresses per tenant security group (TSG), providing flexibility for managing larger sets of IP
addresses.
How to Manage a Trusted IP List from How to Manage a Trusted IP List from the hub
Strata Cloud Manager
To manage a Trusted IP List from To manage a Trusted IP List from the hub,
Strata Cloud Manager, select Settings > select tenant view of the hub > Common
Trusted IP List. Services > Trusted IP List.
You can manage Trusted IP Lists You can manage Trusted IP Lists from the
from Strata Cloud Manager and the hub, but the hub is exempt from the trusted
Strata Cloud Manager web interface and IP address enforcement, so your access to
API will allow access to only those trusted IP the hub is not restricted to the trusted IP
addresses. addresses. If your IP address gets blocked
from a tenant on Strata Cloud Manager that
you should have access to, you can go to the
hub and unlock your access if you have the
listed permissions.
Strata Cloud Manager Getting Started 582 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Unlock Access
After you have activated your license, created your tenants, and managed user access to Strata
Cloud Manager, you can further restrict access to your tenants by adding trusted IP addresses to a
Trusted IP List. By default, any IP address is permitted to access Strata Cloud Manager.
You can add trusted IP addresses using two methods: adding a single IP address or importing
multiple IP addresses in bulk using a CSV file. When adding IP addresses, adhere to the following
guidelines:
• Use CIDR notation for IPv4 addresses only.
• For IP address pools (private address ranges), RFC 1918 and RFC 6598 compliant IP addresses
are recommended.
• Specify a single IP address (e.g., 192.168.1.1) or an IP address range with a subnet mask (e.g.,
10.0.0.0/24)
• Subnet addresses are not supported. Use IP addresses or ranges only.
• (Prisma Access only) Avoid overlapping with these reserved internal IP addresses:
• 169.254.169.253 and 169.254.169.254
• 100.64.0.0/10
• 169.254.201.0/24
• 169.254.202.0/24
When you add new IP addresses, Strata Cloud Manager automatically logs the user who
performed the action. For auditing and visibility purposes, you can easily track this information in
the Added By field field, which populates without any manual input.
Strata Cloud Manager Getting Started 583 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
The change takes effect immediately, so make sure that your IP address is correct or
you can lose access to the tenant.
STEP 4 | Upload the CSV file containing the list of IP addresses. If necessary, you can download a
sample CSV template.
Strata Cloud Manager Getting Started 584 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
You can also click See Details to download the list of IP addresses and the corresponding error
in CSV format.
The change takes effect immediately, so make sure that your IP address is correct or
you can lose access to the tenant.
After you add trusted IPs to a Trusted IP List for your tenant, you can return to unrestricted
access by deleting the trusted IP addresses.
Delete trusted IPs using Strata Cloud Manager.
STEP 1 | Select Settings > Trusted IP List.
Strata Cloud Manager Getting Started 585 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
• Delete a single IP — select the individual check box of the IP, then delete from Actions >
Delete.
If you inherited a Trusted IP List from a parent tenant, you can't delete it from a child
tenant because those are inherited. You can only delete a Trusted IP List from a child
tenant if you added it directly at the child-level.
Unlock Access
Where Can I Use This? What Do I Need?
After you add trusted IPs to a Trusted IP List for your tenant, that access is enforced by
Strata Cloud Manager. If your IP address is not on the Trusted IP List for the tenant, then you see
an access denied message if you try to access it.
If your IP address gets blocked from a tenant that you should have access to, you can go to the
hub to unlock yourself if you have the listed permissions.
Strata Cloud Manager Getting Started 586 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
STEP 1 | From the hub, select tenant view of the hub > Common Services > Trusted IP List.
Strata Cloud Manager Getting Started 587 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
In Settings > User Preferences, you can customize Strata Cloud Manager to suit your specific
needs by modifying User Preferences. These settings include the following:
• Light/Dark/System Mode—Choose between dark and light display modes or choose to follow
your own system settings.
Strata Cloud Manager Getting Started 588 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
•
•
•
•
Strata Logging Service (formerly Cortex Data Lake) is a cloud-based logging system that stores
context-rich enhanced network logs generated by our security products, including our NGFWs,
Prisma Access, and Cloud NGFW for AWS. With Strata Logging Service, you can collect ever-
expanding volumes of data without needing to plan for local compute and storage, and it's ready
to scale from the start. Learn how to activate and deployStrata Logging Service in your product.
Additionally, you can also access and manage logs with Strata Logging Service app
available on the hub. The logging data is the same in both Strata Logging Service app and
Strata Cloud Manager, except for their web interface differences.
Strata Cloud Manager Getting Started 589 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
• View the allocated log storage quota, the available storage space, and the number of days
the logs are retained based on your incoming log rate - click Strata Logging Service > Storage
Status
• Configure log storage quota- click Strata Logging Service > Configure Quota
• Search, filter, and export log data- click Incidents & Alerts > Log Viewer. Log Viewer has same
features as Explore in Strata Logging Service app.
• Forward log data to external servers for long-term storage, SOC, or internal audit- click
Strata Logging Service > Log Forwarding
Strata Cloud Manager Getting Started 590 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Application Experience
Where Can I Use This? What Do I Need?
Use the Application Experience page to manage your Autonomous DEM users and remote sites.
View the audit logs to see which administrators have authenticated to Prisma Access during the
selected Time Range.
Refer to the Manage Autonomous DEM Agent Upgrades to learn about the Upgrade Options.
• license
(with or configuration management)
license
license
Use this tab to get details about all of your registered ADEM users, such as whether the user is
online (the user device is sending keep-alive messages to the ADEM service) or offline (the ADEM
service has not received a keep-alive message from the user device in the last ten minutes), when
the user device was last seen, the username, device type, and hostname of the ADEM user, and
what ADEM agent version they are running.
Each row in the table in this tab represents a unique user in a separate row. Every user/device
combination is considered as a unique user. For example, if 2 users are logged in to 3 devices
each, the number of unique users will be 6. Hence, a user name could be duplicated across
multiple rows depending on the number of devices they are logged in to.
In the title of the table in this widget, the number of Total Endpoint Agents denotes the total
number of devices monitored. The number of Users is the total users regardless of the number of
devices they are logged into. This is because the license consumption is based on the total number
of users regardless of how many devices each user is logged into.
Use the check boxes to the left of the Last logged in User to make bulk configuration by selecting
the row for the endpoints. Deleting an entry by selecting it from the Access Experience Agent
Management table will release the license entry.
Last Logged in User A device can have multiple users logging into
it. This column lists the user ID of the most
Strata Cloud Manager Getting Started 591 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Last Seen The the last message sent from the device to
the DEM server.
• license
(with or configuration management)
license
license
This tab gives you details on the branch Prisma SD-WAN ION devices that are enabled for digital
experience management. Use this tab to get details about all of your registered ADEM remote
sites, such as the device model, hostname, site status, monitoring state (whether monitoring is
enabled for the site), hostname of the high availability server (if there is one), and the remote site
agent version.
Strata Cloud Manager Getting Started 592 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Last Seen The last message sent from the ION device to
the DEM server.
Remote Site Agent Version The version of the ADEM agent installed on
the ION device.
• license
(with or configuration management)
license
license
Domain Health Score Metric Lists the domains for which ADEM calculates health score
Name metrics. Click on a Domain name in this column to view
its metrics. These metrics include the lower and upper
thresholds and how much the numbers impact the total
experience score when they cross the thresholds. These
metrics are not editable.
Associated Use Case The dashboard or widget on which the calculated experience
score displays.
Strata Cloud Manager Getting Started 593 ©2025 Palo Alto Networks, Inc.
Settings: Strata Cloud Manager
Audit Logs
Where Can I Use This? What Do I Need?
• license
(with or configuration management)
license
license
View the audit logs for all the events that are triggered due to API calls..
Event Time The time when the event was triggered which caused
the log to be created.
Email Email address of the person who was notified when the
log was created.
Description The API call that caused the event to trigger thus
creating the log.
Strata Cloud Manager Getting Started 594 ©2025 Palo Alto Networks, Inc.