Monitor Configurations in Secure Workload
This chapter outlines the roles necessary for accessing monitoring options, emphasizing that Site Admins and Customer Support can view detailed agent information, while scope owners can see inventory and agents. The document introduces the concept of agent monitoring, detailing the types of agents available: Deep Visibility agents, which provide comprehensive flow data and process visibility, and Policy agents, which add firewall rule enforcement capabilities. Additionally, it describes AnyConnect and Identity Services Engine (ISE) agents, the latter of which leverages Cisco ISE for metadata collection and endpoint registration. Transitioning to agent status and statistics, the chapter highlights the importance of monitoring agent health through various charts, such as CPU and bandwidth overhead, to ensure optimal performance. It explains that the CPU and Bandwidth Overhead charts offer insights into the resource utilization of Deep Visibility and Enforcement agents. Additionally, the Agent Health chart is crucial for identifying active versus inactive agents, based on their regular check-ins with the configuration server. Monitoring software updates and packet loss is emphasized, as these metrics indicate the agent's ability to upgrade and inspect traffic efficiently.
The chapter also covers the visualization of software versions and operating systems across agents, aiding in understanding the deployment landscape. Users must monitor enforcement status for cloud connectors, such as AWS or Azure, and provides steps for addressing policy enforcement issues, therefore ensuring robust security and compliance across networked resources.
The Monitoring options available to you vary depending on your role.
|
Due to recent GUI updates, some of the images or screenshots used in the user guide may not fully reflect the current design of the product. We recommend using this guide in conjunction with the latest version of the software for the most accurate visual reference. |