Alto MONITOR Manuel d'utilisateur Page 10

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 18
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 9
154 Panorama Administrator’s Guide
Use Case: Monitor Applications Using Panorama Monitor Network Activity
Use Case: Monitor Applications Using Panorama
This example takes you through the process of assessing the efficiency of your current policies and determining
where you need to adjust them to fortify the acceptable use policies for your network.
When you log in to Panorama, the
Top Applications widget on the Dashboard gives a preview of the most used
applications over the last hour. You can either glance over the list of top applications and mouse over each
application block that you want to review the details for, or you can navigate to the
ACC tab to view the same
information as an ordered list. The following image is a view of the
Top Applications widget on the Dashboard.
The data source for this display is the application statistics database; it does not use the traffic logs and is
generated whether or not you have enabled logging for security rules. This view into the traffic on your network
depicts everything that is allowed on your network and is flowing through unblocked by any policy rules that
you have defined.
You can select and toggle the
Data Source to be local on Panorama or you can query the managed firewalls
(
Remote Device Data) for the data; Panorama automatically aggregates and displays the information. For a
speedier flow, consider using Panorama as the data source (with log forwarding to Panorama enabled) because
the time to load data from the remote devices varies by the time period for which you choose to view data and
the volume of traffic that is generated on your network.
Going back to the list of top applications, we can see that bittorrent is very popular. If you now click into the
link for the bittorrent application, the
ACC view filters the display to show information on the application, its
behavior, risk level, and the associated URL categorization details.
Copyright © 2007-2014 Palo Alto Networks
Vue de la page 9
1 2 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Commentaires sur ces manuels

Pas de commentaire