View the results of the configured Cloud Web Security policies for an enterprise from the Monitor tab in the Cloud Web Security page in the New Orchestrator UI portal.

Procedure

  1. In the Orchestrator portal, click the Open New Orchestrator UI option available at the top of the Window.
  2. Click Launch New Orchestrator UI in the pop-up window. The UI opens in a new tab.
  3. From the SD-WAN drop-down menu, select Cloud Web Security.
    The Cloud Web Security page appears.
  4. Click the Monitor tab.

    Under the Monitoring section of Cloud Web Security, you can view the following three monitoring options:

    • Threat Analysis
    • Traffic Analysis
    • Web Logs

    The Threat Analysis dashboard ensures that a user can get detailed visibility into threats. The dashboard displays:

    • Threat Types
    • Threat Origins
    • Vulnerable Services
    • Threats By Users

    The Traffic Analysis dashboard ensures that a user can get detailed visibility into user traffic. The dashboard displays:

    • Top Sites being visited by users
    • Top Categories for traffic
    • Actions Summary, the percentage of traffic being allowed/blocked
    • Top Users

    Web Logs

    Cloud Web Security logs every session and threat. On the Web Logs page, a user may view a list of logs, scrolling through the full list.
    Any log entry may be selected and a Log Entry Details screen will populate below the Web Logs list, giving granular detail on that particular log entry.