Introduction to AIOps Insights

About AIOps Insights

Firewalls are a critical component of any organization's network security architecture. As organizations expand and the threat landscape evolves, managing these firewalls becomes complex. Organizations must continuously update rules and configurations to adapt to new threats, network changes, and compliance requirements, which presents significant challenges. Improper management can lead to security gaps and vulnerabilities. These issues pose risks to an organization's network security.

To effectively address these challenges, a new approach to firewall management is required. This is where AIOps becomes essential. AIOps leverages artificial intelligence (AI) and machine learning (ML) to streamline and enhance firewall management and network security.


Note


Currently, the AIOps features are available only for Firewall Threat Defense devices that are managed by Cloud-Delivered Firewall Management Center. For on-premises FMC-managed Firewall Threat Defense devices, selective AIOps capabilities like Policy Analyzer and Optimizer are accessible via cloud-assist.


AIOps' key functionalities include:

  • Policy Anomaly Detection: Analyzes firewall policies and detects misconfigurations or anomalies before they impact performance or security.

  • Feature Adoption Insights and Best Practice Recommendations: Provides insights into the level of feature adoption and suggests best practices to optimize security configurations.

  • Operational Insights: Evaluates device readiness for software upgrades, suggests compatible versions, and helps plan upgrades to maintain consistency, stability, and compliance across deployments.

  • Critical Alerts: Filters and prioritizes the most urgent security events, helping you focus on critical issues.

AIOps' key features include:

  • AIOps Insights: Provides detailed information on all insights. You can view all anomalies categorized by Severity and Type.

  • Policy Analyzer and Optimizer: Analyzes security policies, detects anomalies, and provides recommendations on remediations that can be performed to optimize the policies, thereby improving the firewall performance.

  • Best Practices and Recommendations: Generates detailed assessment reports that highlight failed checks against Cisco Secure Firewall best practices and provides actionable recommendations to resolve issues, ensuring optimal firewall performance.

  • Feature Adoption: Provides insights into the features that are adopted and the percentage of adoption to modify the usage pattern and achieve optimal security. Analyze the adoption rate of different features to improve usage patterns and enhance security measures.

  • Software Upgrade Planner: Provides upgrade suggestions for your devices through a centralized dashboard. The dashboard displays the current and suggested versions and details about security vulnerabilities and bug fixes.

  • Configuration Settings: Provides the ability to configure thresholds for AIOps features and enable or disable insight preferences. You can customize these settings to suit your specific needs.

The AIOps Summary Dashboard

The AIOps Summary dashboard provides a consolidated view of all insights across your environment. You can assess areas that need attention and drill down into details for deeper analysis. Filter insights by time range, severity, and status.

  • Insights visualization panel: Displays the total number of insights, organized by severity and type.

    • The inner ring summarizes insights by status and severity.

    • The outer ring represents insight categories. Selecting a category displays related details.

  • Insights by device: Click on a device to view insights.

  • Insights by priority: Expand the section to view all devices with related insights.

  • Use the icons at the top right of the page for additional actions:

    • AIOps Insights: Navigate to the view of all AIOps insights.

    • Settings: Navigate to configure preferences and thresholds for insights.

Insight Statuses and Transitions

This table outlines the possible insight statuses, their descriptions, transitions, and examples.

Status

Description

Transition

Triggered by

Example

Active

  • An issue is detected and ongoing.

  • This is the initial state when an issue is identified.

System

Upgrade options suggested for Firewall Threat Defense.

Resolved

  • AIOps automatically marks an active insight as resolved when the issue no longer exists.

  • Historical details are available for reference.

Active to Resolved: After you fix the issue and the system confirms it in the next check.

  • Automatically by the system for performance issues.

  • By the user (with system confirmation) for configuration issues.

Overlapping firewall rules corrected by the user.

Not Applicable (N/A)

  • The issue existed earlier but it is no longer present.

  • No historical data is available for reference.

Active to Not Applicable

System

  • When an Access Control policy is deleted, the corresponding insight is marked as NA.

  • When a device is deleted from FMC inventory, all insights for that device are marked as NA.

  • When earlier Policy Analyzer and Optimizer results showed issues but a recheck finds zero issues and no details to display, the insight is marked as NA.

AIOps Licensing Requirements

If you have licenses for the Secure Firewall Management Center, you can access AIOps by enabling AIOps Insights in your tenant. The initial version of AIOps is included as part of your firewall license and is granted on a per-device basis.

Prerequisites to Use AIOps

  • Ensure that you have access to a Security Cloud Control tenant where AIOps Insights is enabled and Cloud-Delivered Firewall Management Center is provisioned.

  • Ensure that you have configured the thresholds and preferences for the AIOps features.

  • You must have Super Admin or Admin user roles to opt in or opt out of AIOps Insights in your tenant.

View AIOps Insights

The AIOps Insights page provides AI-driven alerts that help you detect, prioritize, and resolve issues across your environment.

Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Summary.

Step 2

On the AIOps summary page, click AIOps Insights at the top right.

Insights are displayed in chronological order and can be filtered by the following:

  • Time: Select a time range to view insights generated within that window

  • Severity: Select a severity level, such as Critical, Warning, or Informational.

  • Insight: Select a type of insight to view.

  • Category: Select a category such as Configuration, Health, Operations, and so on.

  • Impacted Resources: Select a device or service affected by the insight.

  • Status: Select a status, such as Active, Not applicable, or Resolved stauses.

Clicking Reset all clears all applied filters and returns to the default view.

Step 3

In the insights table, click an Insight or Impacted Resource to view additional details.

The details include a summary of the issue, the probable cause, related metrics, and recommended remediation or upgrade actions to ensure optimal performance.

Step 4

Use the icons at the top right of the page for additional actions:

  • AIOps Summary: Navigate to the view the high-level summary of all insights.

  • Settings: Navigate to configure preferences for AIOps features.


Implement Best Practices and Recommendations

Enhance your organization’s security posture with AIOps by identifying deviations from Cisco Secure Firewall best practices. Run assessments on your devices, generate reports, and receive insights that guide you toward optimal performance.

  • Assessment: Evaluates your firewall configuration across multiple categories. Each check determines alignment with Cisco Secure Firewall best practices. The report summarizes the total number of checks performed. It categorizes the results as Passed or Requires review.

    Checks that require review indicate deviations that could impact firewall efficiency and security. Each failed check presents an opportunity for improvement. Addressing these checks contributes directly to optimizing firewall performance.

  • Recommendation: Provides specific recommendations to address identified issues, ensuring optimal firewall performance. These include detailed information such as the nature of the problem, symptoms, impact, and required actions.

The best practices and recommendations checks are developed with input from Cisco's Technical Assistance Center (TAC) and Customer Experience (CX) teams. This input helps address trending issues, incorporate industry best practices, and enhance the reliability of recommendations. Implement these recommendations to resolve issues, align with best practices, and optimize firewall performance.

Table 1. Key Features

Feature

Description

Automated Assessments

Runs periodic evaluations of firewall devices against Cisco best practices.

Checks Summary

Displays how many checks passed and highlights those requiring review.

Trend Visualization

Shows the number of checks over time, helping you compare passed and failed checks across assessment cycles.

Device Reports

Provides device-specific results and percentage of improvement potential.

Review Category and Check Control

Enable or disable review categories or individual checks for future assessments.

Before you begin

Ensure that Best Practices is enabled under Settings. For more information, see AIOps Settings.

Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Best Practices and Recommendations.

The Assessment Summary provides a high-level overview of assessment results. It includes two tiles:

  • Checks summary: Displays the total number of checks and highlights those requiring review.

  • Best practices assessment trend: Helps you track assessment outcomes over time. The Y-axis represents the number of checks, and the X-axis shows assessment dates. You can hover over data points to view summary statistics.

  • Feedback: A mechanism for you to provide feedback on the assessments. You can enter optional comments and grant consent for follow-up contact regarding your feedback.

Step 2

In the Device reports section, you can view the list of all available device reports. Filter devices by Device status, Review categories, or Assessment status to narrow down results.

Assessment Statuses: Each device report has an Assessment Status, which indicates the current state of the assessment.

  • In progress: An assessment is actively running. After completion, a report will be generated.

  • In queue: The previous assessment is outdated, and a new one has been scheduled.

  • Updated: The assessment is complete, and the latest report is available for review.

  • Error: The assessment could not be completed due to an error. The report will be automatically generated after 24 hours. If the issue persists, contact Cisco TAC for assistance.

Step 3

From the three-dot menu icon next to each device:

  1. Click Run assessment to initiate a new assessment.

    Note

     

    Periodic assessments run automatically, but you can also run assessments manually at any time. For large-scale deployments with more than 50 devices, you must run assessments manually due to processing limits.

  2. Click Download report to export the Best Practices assessment summary report in PDF format.

Step 4

Click on a Device name to view a detailed report for that specific device.

  • Check the Show passed checks checkbox to view successful checks in the detailed view. This provides full visibility into all checks.

  • In the Best practices assessment section, view the Total checks, how many Passed and Require review.

  • Expand each check to view the remediations and corrective actions.

Step 5

Enable or disable an entire category from future assessments. You can also disable individual checks within a category.

  • Disable the toggle to exclude a review category or check from future assessments.

  • Enable the toggle to include it in future assessments.

Note

 

Disabling a category or check does not affect the actual feature or its operation. The feature continues to function normally, but it is excluded from Best Practices assessments.


Assess and Improve Feature Adoption

The Feature Adoption dashboard provides a comprehensive view of how effectively different features are being utilized across your environment. Each feature has an adoption rate. This rate is calculated based on the total number of eligible devices and the number of those devices configured with the feature. This insight helps you identify underutilized capabilities and take steps to improve overall adoption.

The dashboard groups features into license categories such as Essentials, IPS, Remote Access VPN, Features not requiring license, and Subscription-Based Features to help you understand adoption patterns.


Note


If a license is not available for a given category, the adoption rate for that category will always be 0%.


By tracking the adoption rate at both the feature and license category levels, you can prioritize improvements and maximize the usage of available features. Feature Adoption helps you use available capabilities to achieve your intended outcomes

Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Feature Adoption.

  • The Summary tile provides a quick overview of overall adoption status:

    • Adoption rate: Percentage of features currently adopted across their applicable scope.

    • Total features: Total number of features available for adoption.

    • Not adopted: Number of features that have not been enabled or configured.

    • Partially adopted: Number of features that are enabled or in use but not fully across all applicable scope.

    • Adopted: Number of features that are fully enabled and in use.

  • In the Feature Recommendation tile, you can watch short videos about recommended features that will help enhance your organization’s security.

Note

 
  • The data updates every 24 hours, but you can click Refresh to update it manually.

  • We recommend that you increase the usage of these features to improve overall performance.

Step 2

Click a feature name to view the following details:

  • A short description of the feature.

  • The feature adoption rate can range from 0% to 100%, based on how much the feature is used. Enable the toggle to include the feature in adoption calculations or disable it to exclude it.

    Note

     

    Enabling or disabling a feature affects only the adoption score and does not impact the functionality of the feature.

  • Steps to improve your feature adoption rate.


Manage Software Upgrades

The Software Upgrade Planner helps you evaluate and choose the right version for your Firewall Threat Defense device software upgrades. The centralized dashboard displays comprehensive upgrade recommendations for your Firewall Threat Defense devices, including their current and three recommended versions, along with details on security vulnerability fixes and bug fixes.

Before you begin

Ensure that Software Upgrade Planner is enabled under Settings > Operations. For more information, see AIOps Settings.

Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Software Upgrade Planner.

The Device summary tile displays the number of Firewall Threat Defense devices in your network having upgrade recommendations. The displayed data is automatically updated every hour.

Step 2

Click Go to product upgrade to navigate to the Product Upgrades page for upgrade actions on the Cloud-Delivered Firewall Management Center. This page allows you to:

Step 3

Click Download report to export the Software Upgrade Planner report in PDF format.

Step 4

The Security vulnerability and bug fixes section displays the total number of available fixes, categorized into Security vulnerability fixes and Bug fixes. Click View all.

The page displays a table listing all the available fixes for your devices, including security vulnerabilities and bug fixes in separate tabs.

The security vulnerability fixes tab

Use the Search text box to find specific security vulnerabilities and filter the results by Severity.

  • CVE ID: Displays the unique identifier for the security vulnerability.

    • Click on a CVE ID to view detailed information in the panel on the right-hand side, including CVE details, Description and Impacted devices.

    • Expand CVE details and click Open Security Advisory to navigate to the official Cisco security advisory page.

      The advisories provide details such as affected products, workarounds, fixed software, revision history, and other public announcements. You can view all published security advisories at Cisco Security Advisories.

  • Title: Name of the vulnerability.

  • Impact: Severity level of the vulnerability.

  • Description: A brief explanation of the vulnerability.

  • Impacted devices: List of devices affected by the vulnerability.

  • CVSS score: The Common Vulnerability Scoring System (CVSS) score, a standardized method for rating vulnerability severity.

  • Available fixes: List of the software versions or patches that address the vulnerability.

The bug fixes tab

Use the Search text box to find specific bugs and filter the results by Severity.

  • Bug ID: Displays the unique identifier for each bug.

    • Click on a Bug ID to view detailed information in the panel on the right-hand side, including Bug details, Description and Impacted devices.

    • Expand Bug details and click Open in bug Search Tool to navigate to the details on the Bug Search Tool.

  • Title: Name of the bug.

  • Severity: Severity level of the bug.

  • Description: A brief explanation of the bug.

  • Impacted devices: List of devices affected by the bug.

  • Available fixes: List of the software versions or patches that address the bug.

Step 5

In the Software Upgrade Planner page, click on a device name to view more details about the upgrade options.

Multiple upgrade options are available based on vulnerabilities, bugs, and new features. The Cisco-suggested version is indicated by a gold star. Choose the version that suits your requirements. The Recommended upgrades section displays:

  • Recommended version 1

  • Recommended version 2

  • Golden version

You can access release highlights by clicking on the Release Notes link associated with each recommended version. Additionally, this page provides details on Security vulnerability fixes and Bug fixes relevant to the current version of the device.


Manage Insight Preferences

You can enable or disable insight preferences for your tenant for the following AIOps features:

Enable AIOps Insights

To take advantage of AIOps' benefits, you must enable AIOps Insights. You must have Super Admin or Admin user roles to enable AIOps Insights in your tenant.

Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Settings.

Step 2

Click Start Onboarding.

Step 3

In the AIOps Insights for Cisco Firewall window, click Setup.

Step 4

In the Setup AIOps page, check the Confirm AlOps activation check box.

Step 5

Click Get Started.

The onboarding process begins, and it takes a few minutes to fetch the data that is required to provide the insights. When completed, the AIOps > Summary page is displayed.


Disable AIOps Insights

You can choose to opt out of AIOps if you no longer want to use the capabilities. When you opt out, AIOps stops collecting data from your devices and deactivates all data processing and alerts. You must have Super Admin or Admin user roles to disable AIOps insights in your tenant.

Data Cleanup Options

When opting out, you can decide how existing data is handled:

  • Keep existing data: Stops the AIOps service but retains your historical data. If you choose to opt in again later, this data can be reused for improved insights.

  • Remove all data: Stops the AIOps service and permanently deletes all existing AIOps data. Deleted data cannot be recovered.

Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Settings.

Step 2

Click Miscellaneous.

Step 3

Under Opt out of AIOps, choose your preferred data cleanup option.

Step 4

Click Opt out of AIOps.


Best Practices and Recommendations Insights

You can modify the preferences for Best Practices & Recommendations-related insights.


Note


The setting for Best Practices & Recommendations is enabled by default.


Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Settings.

Step 2

Click Best Practices.

Step 3

Enable the Best Practices & Recommendations Analysis toggle button to view the assessment categories, checks performed under each category, and the number of failed checks for each device.

Step 4

Enable the Automatic assessment toggle to activate automated report generation.

Step 5

Click Submit.


After you enable the feature for your tenant, you can view the detected anomalies in the Summary page, and the respective widget is displayed on the dashboard.

Feature Adoption Insights

You can modify the preferences for Feature Adoption-related insights.


Note


The setting for Feature Adoption is enabled by default.


Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Settings.

Step 2

Click Feature Adoption.

Step 3

License categories such as Essentials, IPS, Features not requiring license, Remote Access VPN, and Subscription-Based Features are listed. Expand a category to view the individual features.

Step 4

For each feature:

  • Check the checkbox to include it in adoption rate calculations.

  • Clear the checkbox to exclude it from adoption rate calculations.

Step 5

You can select a category to bulk include all features in that category.

Disabled features continue to function normally but are excluded from the adoption rate calculation.

Step 6

Click Submit.


Operational Insights

You can modify the preferences for operations-related insights.


Note


The setting for Software Update Planner is enabled by default.


Procedure


Step 1

In the left pane, click Monitor > Insights & Reports > AIOps Insights > Settings.

Step 2

Click Operations.

Step 3

Enable the Software Update Planner toggle. You can view the software versions running on your devices and our upgrade recommendations.

Step 4

Click Submit.

After you enable this feature for your tenant, detected insights are listed in the Summary page.


Frequently Asked Questions About AIOps

What is AIOps?

AIOps for firewalls leverages artificial intelligence (AI) and machine learning (ML) to streamline and enhance firewall management. By continuously analyzing the data, AIOps provides insights that help you:

  • Optimize firewall policies and configurations.

  • Detect misconfigurations before they impact performance.

  • Improve feature adoption and adherence to best practices.

  • Receive upgrade suggestions for Secure Firewall Threat Defense devices, including bugs fixes and security vulnerabilities fixes.

Are AIOps features available for all types of FMC-managed Firewall Threat Defense devices?

AIOps capabilities for FMC-managed Firewall Threat Defense devices are accessible via cloud-assist, enabling features such as Policy Analyzer and Optimizer.

Can onboarding AIOps fail?

If an onboarding failure occurs, open a support ticket with Cisco Technical Assistance Center (TAC).

Can AIOps Insights be disabled?

Opting out of AIOps stops data collection and disables insights. You can choose whether to retain or permanently delete historical data. For more information, see Disable AIOps Insights.

Can I disable specific AIOps modules?

Yes. From AIOps Settings, you can enable or disable modules such as Feature Adoption, Best Practices & Recommendations, and Operations. Disabled modules stop generating insights but do not affect device functionality.

Can I manually run Best Practices and Recommendations assessments?

Periodic assessments run automatically, but you can also run assessments manually at any time. For large-scale deployments with more than 50 devices, you must run assessments manually due to processing limits.