: What Features Does Prisma Access Support?
Focus
Focus

What Features Does Prisma Access Support?

Table of Contents

What Features Does Prisma Access Support?

Learn about what features are supported for Prisma™ Access.
Prisma™ Access helps you to deliver consistent security to your remote networks and mobile users. There are two ways that you can deploy and manage Prisma Access:
  • Cloud Managed Prisma Access
    —If you aren’t using Panorama™ to manage firewall, the Prisma Access app on the hub gives you a simplified way to onboard and manage Prisma Access.
  • Panorama Managed Prisma Access
    —If you are already using Panorama to manage your next-generation firewalls, you can use Panorama to deploy Prisma Access and leverage your existing configurations. You’ll need the Cloud Services plugin to use Panorama for Prisma Access.
The features and IPSec parameters supported for Prisma Access vary depending on the management interface you’re using—Panorama or the Prisma Access app. You cannot switch between the management interfaces after you activate your Prisma Access license. This means you must decide how you want to manage Prisma Access before you begin setting up the product. Review the Prisma Access Feature Support information to help you select your management interface.
For a description of the features supported in GlobalProtect™, see the features that GlobalProtect supports.

Management

Feature
Prisma Access (Cloud Managed)
Prisma Access (Panorama Managed)
Best Practice Checks
Default Configurations
Default settings enable you to get started quickly and securely
Examples include:
  • Default DNS settings
  • Default GlobalProtect settings, including for the Prisma Access portal
  • Default Prisma Access infrastructure settings
Built-in Best Practice Rules
So you’re as secure as possible, enable your users and applications based on best practice templates. With best practices as your basis, you can then refine policy based on your enterprise needs.
Features with best practice rules include:
  • Security rules
  • Security profiles
  • Decryption
  • M365
Onboarding Walkthroughs for First-Time Setup
Guided walkthroughs include:
  • Onboard Remote Networks
  • Onboard Mobile Users (GlobalProtect)
  • Onboard Your HQ or Data Centers
  • Turn on Decryption
Centralized Management Dashboards
Can includes Best Practice scores and usage information
Dashboards are available for features including:
  • Security Policy
  • Security Profiles
  • Decryption
  • Authentication
  • Certificates
  • SaaS Application Management
Hit Counts
Hit counts for security profiles include counts that measure the profile’s effectiveness, and these can depend on the profile (for example, unblocked critical and high severity vulnerabilities, or WildFire submission types).
Policy Rule Usage
Profile Groups

Remote Networks

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
IPSec Tunnels
See Supported IKE Cryptographic Parametersfor a list of the supported IKE crypto parameters.
FQDNs for peer IPSec addresses are not supported; use an IP address for the peer address instead.
Secure Inbound Access
Tunnel Monitoring
Dead Peer Detection (DPD)
ICMP
Bidirectional Forwarding Detection (BFD)
SNMP
Use Tunnel Monitoring instead of SNMP to monitor the tunnels in Prisma Access.

Service Connections

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
IPSec Tunnels
See Supported IKE Cryptographic Parameters for a list of the supported IKE crypto parameters.
FQDNs for peer IPSec addresses are not supported; use an IP address for the peer address instead.
Tunnel Monitoring
Dead Peer Detection (DPD)
ICMP
Bidirectional Forwarding Detection (BFD)
SNMP
Use Tunnel Monitoring instead of SNMP to monitor the tunnels in Prisma Access.
Traffic Steering
(using policy-based forwarding rules to forward internet-bound traffic to service connections)
Introduced in version 1.7.

Mobile Users—GlobalProtect

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Using On-Premise Gateways (Hybrid Deployments)
On-premise gateway integration with Prisma Access
Using on-premise gateways with Prisma Access gateways is supported.
Priorities for Prisma Access and On-Premise Gateways
Supported for deployments that have on-premise GlobalProtect gateways. You can set a priority separately for on-premise gateways and collectively for all gateways in Prisma Access. You can also specify source regions for on-premise gateways.
Manual Gateway Selection
Users can manually select a cloud gateway from their client machines using the GlobalProtect app.
GlobalProtect Gateway Modes
External Mode
Internal Mode
You cannot configure Prisma Access gateways as internal gateways; however, you can add one or more on-premise gateways and configure them as internal gateways.
GlobalProtect App Connect Methods
User-Logon (always on)
Pre-Logon (always on)
Pre-Logon (then on-demand)
On-Demand
Clientless VPN
Clientless VPN
Mobile User—GlobalProtect Features
Mobile Device Management (MDM)
MDM Integration with HIP
Prisma Access does not support AirWatch MDM HIP service integration; however, you can use the GlobalProtect App for iOS and Android MDM Integration for HIP-Based Policy Enforcement
Administratively Log Out Mobile Users
Introduced in version 1.4.
DHCP
Prisma Access uses the IP address pools you specify during mobile user setup to assign IP addresses to mobile users and does not use DHCP.
GlobalProtect App Version Controls
One-click configuration for GlobalProtect agent log collection

Mobile Users—Explicit Proxy

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Explicit Proxy Support
Introduced in 2.0 Innovation.
Explicit Proxy Connectivity in GlobalProtect for Always-On Internet Security
Introduced in Prisma Access 4.0 Preferred with GlobalProtect app version 6.2
Introduced in Prisma Access 4.0 Preferred with GlobalProtect app version 6.2

Security Services

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Security Policy
DoS Protection
The Prisma Access infrastructure manages DoS protection.
SaaS Application Management
Supported for:
  • Microsoft 365 apps
    Includes a guided walkthrough to safely enable M365
  • Google apps
  • Dropbox
  • YouTube
IoT Security
Security Profiles
Supported Profile Types
  • Anti-Spyware
  • DNS Security
  • Vulnerability Protection
  • WildFire and Antivirus
  • URL Filtering
  • File Blocking
  • Data Loss Prevention (DLP)
  • HTTP Header Insertion
  • Anti-Spyware
  • DNS Security (enabled via an Anti-Spyware profile)
  • Vulnerability Protection
  • Antivirus
  • WildFire
  • URL Filtering
  • File Blocking
  • Data Loss Prevention (DLP)
Dashboards for Security Profiles
Dashboards are tailored to each profile, and give you:
  • centralized management for security service features
  • visibility into profile usage and effectiveness
  • access to cloud databases (search for threat coverage, for example)
Best Practice Scores for Security Profiles
HTTP response pages are supported for mobile users and users at remote networks. To use HTTPS response pages, open a CLI session in the Panorama that manages Prisma Access, enter the
set template Mobile_User_Template config deviceconfig settingssl-decrypt url-proxyyes
command in configuration mode, and commit your changes.
HTTP Header Insertion
Decryption
SSL Forward Proxy
SSL Inbound Inspection
SSH Proxy
Guided Walkthrough:
Turn on Decryption

Network Services

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Network Services
Prisma Access uses the same QoS policy rules and QoS profiles and supports the same Differentiated Services Code Point (DSCP) markings as Palo Alto Networks next-generation firewalls.
QoS for Remote network deployments that allocate bandwidth by compute location is introduced in version 3.0 Preferred.
Application Override
IPv4 Addressing
IPv6 Addressing
Introduced in version 2.2 preferred.
Split Tunnel Based on Access Route
Split Tunnel Based on Destination Domain, Client Process, and Video Streaming Application
NetFlow
NAT
Prisma Access automatically manages outbound NAT; you cannot configure the settings.
SSL VPN Connections
Routing Features
Static Routing
Dynamic Routing (BGP)
Dynamic Routing (OSPF)
High Availability
Availability maintained by Palo Alto Networks.
SMTP
Prisma Access may block SMTP port 25 for security reasons and to mitigate the risk from known vulnerabilities that exploit non-secure SMTP. Palo Alto Networks recommends using ports 465, 587 or an alternate port 2525 for SMTP.
Prisma Access may block SMTP port 25 for security reasons and to mitigate the risk from known vulnerabilities that exploit non-secure SMTP. Palo Alto Networks recommends using ports 465, 587 or an alternate port 2525 for SMTP.

Identity Services

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Authentication Types
SAML
Requires 3.0 Innovation or a later Innovation release.
Requires 3.0 Innovation or a later Innovation release.
TACACS+
RADIUS
LDAP
Kerberos
Kerberos is supported for Windows clients only.
MFA
Local Database Authentication
Authentication Features
Authentication Rules
Authentication Portal
Supported for both IPSec and mobile users with GlobalProtect.
Supported for both IPSec and mobile users with GlobalProtect.
Framed-IP-Address retrieval from RADIUS server
Single Sign-On (SSO)
Supported for the following platforms:
  • Citrix XenApp 7.
    x
  • Windows Server 2019
  • Windows 10 Enterprise Multi-session
A maximum of 400 TS Agents are supported.
Supported for the following platforms:
  • Windows Server 2019
  • Windows 10 Enterprise Multi-session
A maximum of 400 TS Agents are supported.
Cloud Identity Engine (Directory Sync Component)
Directory Sync for User and Group-Based Policy
Supports on-premises Active Directory and Azure Active Directory.
You can retrieve user and group information using the Directory Sync component of the Cloud Identity Engine.
Prisma Access supports on-premises Active Directory, Azure Active Directory, and Google IdP.
Introduced in version 1.6. Support for Azure Active Directory introduced in 2.0 Preferred. Support for Google IdP introduced in 3.0 Preferred and Innovation.
Identity Redistribution
  • IP-address-to-username mappings
  • HIP
  • Device Quarantine
  • IP-Tag
  • User-Tag
Ingestion of IP-address-to-username mappings from 3rd party integration (NAC)
Introduced in version 1.7.
Requires Panorama running 9.1.1 or later.

Policy Objects

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Addresses
Address Groups
Dynamic Address Groups (DAGs) and Auto-Tags
XML API - Based DAG Updates
Regions
App-ID (Applications)
Commit warnings are not supported for Prisma Access.
Service-Based Session Timeouts
Application Groups
Application Filters
Services
Service Groups
Tags
Introduced in version 1.7.
Requires Panorama running 9.1.1 or later.
Auto-Tag Actions
HIP Objects
HIP-Based Security Policy
HIP Report Submission
HIP Report Viewing
Introduced in version 1.5.
Introduced in version 1.5.
HIP Objects and Profiles
Certificate Management
Custom Certificates
Palo Alto Networks Issued Certificates
Certificate Profiles
Custom Certificates
SSL/TLS Service Profiles
SSL
SSL is supported only for Mobile Users, not for site-to-site VPNs
SCEPs
OCSP Responders
Default Trusted Certificate Authorities

Logs

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Cortex™ Data Lake Log Storage
Forward logs stored in Cortex Data Lake to syslog and email destinations
Default log forwarding profile
HTTP, SNMP, auto-tagging in Built-in Actions not supported
Introduced in version 1.7.
Requires Panorama 9.1.1 or a later version. If you use Panorama running a 9.0 version, you can still see traffic and HIP logs from Panorama but you need to use the Explore app from the Hub to see the remaining logs.

Reports

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Reports
Introduced in Prisma Access 1.8.
App Report
This feature has the following Cortex Data Lake-based limitation:
SaaS Application Usage
report (
Monitor
PDF Reports
SaaS Application Usage
)—Cannot filter the logs for user groups (the
Include user group information in the report
choice is not supported)
Usage Report
User Activity Report
Best Practices Report
WildFire Reports
Supported starting 2.0 Innovation.

Integration with Other Palo Alto Networks Products

Feature
Prisma Access (Cloud-Managed)
Prisma Access (Panorama-Managed)
Cortex XSOAR integration
Source IP-based allow lists and malicious user activity detection is supported.
Cortex XDR integration
Prisma Access is compatible with the Cortex XDR version of Cortex Data Lake. Cortex XDR receives Prisma Access log information from Cortex Data Lake.
Prisma Access is compatible with the Cortex XDR version of Cortex Data Lake. Cortex XDR receives Prisma Access log information from Cortex Data Lake.
Prisma SaaS integration

Multitenancy Unsupported Features and Functionality

The following Prisma Access (Panorama Managed) features are not supported in a multitenant deployment:
In addition, a Panorama Managed multitenant deployment has changes to the following functionality:
  • You cannot view your Panorama Managed tenants under Common Services: Tenant Management.
  • For Panorama-managed Prisma Access, continue to use Panorama for managing Prisma Access and the admin access that is controlled locally on Panorama. You cannot manage users, roles, and services accounts using Common Services: Identity and Access for Panorama-managed Prisma Access. However, you can use Common Services: Identity and Access for managing other apps such as ADEM and Insights.
  • You cannot use the Prisma Access APIs in pan-dev.
The following Prisma Access components and add-ons have the following caveats when used in a multitenant deployment:
  • For Prisma Access—Explicit Proxy deployments, if you have an existing Prisma Access non-multitenant deployment and convert it to a multitenant deployment, only the first tenant (the tenant you migrated) supports Explicit Proxy. Any subsequent tenants you create for the multitenant deployment after the first do not support Explicit Proxy.
  • SaaS Security and Enterprise Data Loss Prevention (Enterprise DLP) support multitenancy with the following restrictions:
    • Only a Superuser on Panorama can create DLP profiles and patterns and can associate DLP profiles to security policies for tenants.
    • A Superuser must commit all changes to Panorama whenever they make changes in DLP profiles and patterns.
    • All tenants share a single copy of profiles and pattern configurations; therefore, any changes done to them will be reflected across all tenants.
    • Since security policies can be different across tenants, each tenant can have different data filtering profiles associated with security policies.
  • Prisma SD-WAN integration and Configuring multiple portals in Prisma Access can only be used with one tenant per multitenant deployment.
  • If you enable High Availability (HA) with active and passive Panorama appliances in a multi-tenant deployment, you cannot change the HA pair association after you enable multi-tenancy.

Recommended For You