On This Page
How STRE Works
STRE collects data from SecureTrack.
This data includes: device, rule and traffic information, rule and object changes, security violations, unauthorized platform revisions, security violations, security best practices, shadowed rules and security requests that need to comply with a Unified Security Policy (USP). In addition, you can gather information on firewalls managed by Palo Alto devices, Cisco IOS routers, or Cisco ASA firewalls, to determine how well the device configurations meet the vendor CIS requirements which have been defined.
You determine which domains and devices, or device groups, STRE collects data from when creating a report.
After you create a report, the reporting pack then distributes this information to e-mail addresses that you define at the time of the report's creation. The report recipients can view the report output in their browsers, or access and download the report output as a PDF or CSV file. When creating the report, you will also define the schedule for sending the report output to the recipients, allowing you, for example, to coordinate the distribution of the report outputs with reoccurring meetings.
These reporting capabilities will enable you to efficiently collect data from SecureTrack and distribute it in a reader-friendly format to all the relevant recipients.