Features Introduced in GlobalProtect App 6.3.3-h3 (6.3.3-711)
The following new feature is introduced in GlobalProtect app 6.3.3-h3
(6.3.3-711).
Detect Proxy for Each Connection for macOS
Auto-detect proxy support on macos devices.
The GlobalProtect app can be configured to automatically detect the proxy for the portal
connection and reuse it for subsequent connections. Starting with GlobalProtect version
6.3.3-h3, this capability is supported for macOS endpoints in addition to Windows
endpoints. For more information, see Customize the GlobalProtect App.
Features Introduced in GlobalProtect App 6.3.3-h2 (6.3.3-c676)
The following new feature is introduced in GlobalProtect app 6.3.3-h2
(6.3.3-c676).
Support for Captive Portal in GlobalProtect Proxy Mode
GlobalProtect in proxy mode
GlobalProtect 6.3.3-h2 (6.3.3-c676) and later versions support captive portal in proxy
and tunnel and proxy (hybrid ) modes. To configure captive portal in these deployment
modes, set the captive portal exception timeout to 600 seconds and enable direct
internet access for connectivity check endpoint URLs, bypassing the configured proxy or
content filtering. For more information, see Configure Captive Portal Detection in Proxy and
Hybrid Modes.
Features Introduced in GlobalProtect App 6.3.3-h1 (6.3.3-c650)
The following new feature is introduced in GlobalProtect app 6.3.3-h1
(6.3.3-c650).
Allow Gateway Access from GlobalProtect Only
Allow Gateway Access from GlobalProtect Only
If endpoint traffic policy enforcement is enabled in your environment and you set
Allow Gateway Access from GlobalProtect Only to yes, the
gateway public IP address can be accessed only by GlobalProtect. All other traffic from
the endpoint to the public IP address will be dropped. The default value for this
feature is No.
Features Introduced in GlobalProtect App 6.3.3
The following new feature is introduced in GlobalProtect app 6.3.3.
Reveal Password on Windows Logon for GlobalProtect
Reveal Password icon displays password when you type
Starting with GlobalProtect™ 6.3.3, the Windows logon and Change Password screens include
a Reveal Password icon. This feature allows you to see your password as you type,
helping to prevent password errors and avoid locked accounts. Click the icon while
logging in or changing your password to display the entered characters.
The Windows login screen displays the GlobalProtect connection status and gateway along
with the Reveal Password icon. Similarly, the Change Password dialog box shows your
username, domain name, GlobalProtect connection status, and gateway in addition to the
Reveal Password icon in the password field. For more information, see Reveal Password on Windows Logon Screen for
GlobalProtect.
SAML Authentication Via Trusted IP Addresses
Enforce SAML authentication only via trusted IP addresses
With GlobalProtect™ 6.3.3 and later versions, you can enforce SAML authentication to
succeed only if the authorization request comes from trusted IP addresses. Users
authenticating from untrusted IP addresses cannot access the Prisma Access portal or
gateway. For more information, see Enforce SAML Authentication from Trusted IP
Addresses.
GlobalProtect Embedded Browser with Captive Portal
Embedded browser supported with captive portal
You can use the GlobalProtect embedded browser for captive portal authentication. This
allows the captive portal to open within the embedded browser, providing a seamless user
experience and enhanced security. For more information, see Customize the GlobalProtect App.
Features Introduced in GlobalProtect App 6.3.2
The GlobalProtect App 6.3.2 does not include any new features.
Features Introduced in GlobalProtect App 6.3.1
The following new feature is introduced in GlobalProtect app 6.3.1.
Traffic Enforcement with Forwarding Profiles
Enable traffic enforcement to block outgoing connections.
You can block outbound UDP and IPv6 traffic from endpoints when GlobalProtect agent is
deployed in proxy mode. You can also customize your block actions. This option is
available only if you have Prisma Access managed by Strata Cloud Manager and
GlobalProtect agent 6.3.1. For more information, see Prisma Access Explicit Forwarding
Profiles.
Intelligent Internal Host Detection
Information about the new parameter, Enable Intelligent Internal Host Detection.
When your remote users rely on both the GlobalProtect app and a third-party VPN client,
the applications can conflict, leading to issues with User-ID recognition.
Traditionally, if the third-party VPN establishes its tunnel before the GlobalProtect
app can complete its internal host detection process, the User-ID mapping fails, causing
policy enforcement problems. This prevents you from maintaining consistent, user-based
security policies for all traffic.
To resolve this complex interoperability challenge, the GlobalProtect app, starting with
version 6.3.1 and later releases, introduces the Enable Intelligent Internal
Host Detection parameter. This parameter ensures that identification
functions work seamlessly alongside external network agents.
When you enable the Intelligent Internal Host Detection parameter, the GlobalProtect app
detects the presence of the third-party VPN agent. The application then re-triggers the
network discovery processes until the Internal Host Detection is successfully completed.
This capability ensures that User-ID mapping and appropriate internal security policies
are applied, regardless of the order in which the 3rd party VPN tunnels are established.
This functionality eliminates gaps in user-specific policy enforcement when your users
rely on external VPNs for accessing private applications.
GlobalProtect uses a network discovery method to select the best available gateway by
using criteria such as gateway priority, load, and response time from each
gateway.
Suboptimal endpoint conditions, such as high CPU usage or system load, can negatively
impact network response time measurements and lead to a suboptimal gateway selection.
GlobalProtect® introduces the Best Gateway Selection Criteria to solve this
challenge. This capability ensures reliable network discovery results by preventing
local endpoint conditions from skewing the measurement of available gateway options.
The selection process evaluates criteria such as gateway priority, load, and response
time to determine the best available gateway. When you select Response
Time as the primary criteria, GlobalProtect measures the duration of a
successful TCP handshake to establish the external gateway connection. Measuring the TCP
handshake provides a highly accurate network latency reading because it isolates network
connection time from processing delays on the endpoint itself. This isolation guarantees
that endpoints connect to the gateway with the highest priority and shortest actual
network response time, improving user experience and network efficiency.
Wildcard Support for Split Tunnel Settings Based on the Application
Wildcard Support for Split Tunnel Settings Based on the Application
This feature avoids constant manual updates to split-tunnel configurations.
When third-party application paths change after a software or patch update, security
administrators often waste time manually modifying the exclusion or inclusion lists.
You can now configure the path for the endpoint application using
the wildcard character (*) while setting up application-based
split-tunneling, for both excluded and included traffic. This enhancement simplifies
administration for common third-party applications, such as Symantec Web Security
Service (WSS) or Microsoft Teams.
When you use the wildcard character in the application path and add it to the
exclude or include list, GlobalProtect® bypasses the specific application path check.
This ensures that even if the application path changes after a software or patch update,
the split-tunnel configuration remains accurate without requiring manual intervention.
You can add up to 200 entries to the list to exclude or include traffic through the VPN
tunnel.
Enhancements for Authentication Using Smart Cards
Enhancements for Authentication Using Smart Cards on macOS Endpoints
Currently, users configured for smart card authentication must rely solely on their PIV
card to access GlobalProtect, potentially blocking access if the physical card is
unavailable or forgotten. This dependency caused connectivity disruption, especially for
endpoints running Windows or macOS in On-demand operational modes.
To ensure continuous connectivity and user flexibility, GlobalProtect® now provides end
users with resilience through flexible authentication profiles. When
smart card authentication is enabled, the GlobalProtect app automatically displays two
distinct profile options: one profile optimized for smart card login and a second
profile for traditional username and password credentials. This key feature allows end
users to immediately choose their preferred authentication method directly from the
app's portal drop-down menu. This ensures that secure access remains consistently
possible even if they forget their physical PIV card or encounter smart card reader
issues, significantly improving the reliability of user access without compromising
security protocols.
The smart card authentication fallback will happen only if you have selected the
Allow Authentication with User Credentials OR Client Certificate
option while configuring the GlobalProtect gateway and portal. This option
defines whether users can authenticate to the portal or gateway using credentials and/or
client certificates.
For Windows endpoints, you can predeploy the customized Windows Registry key values for
the profile options <PIV> and <NO
PIV>.
Improvements for Multi Authentication CIE Experience
Improvements for Multi Authentication CIE Experience
When CIE (SAML) multi-authentication is configured
for the GlobalProtect app as the authentication method, end users are no longer required
to enter their single sign-on (SSO) credentials when they try to authenticate to the
app.
You can now predeploy the registry key CASSKIPHUBPAGE (path:
\HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto
Networks\GlobalProtect\Settings) on the Windows endpoints to enable this
feature.
After you enable this feature, end users are not prompted to enter their SAML credentials
while authenticating to the app using the embedded browser or the default browser. This
feature is supported only on Windows platforms.
Features Introduced in GlobalProtect App 6.3.0
The following new features are introduced in GlobalProtect app 6.3.0.
Enhanced HIP Remediation Process Improvements
Enhanced HIP remediation process improvements
You can now configure the GlobalProtect app to rerun the HIP remediation script whenever the
GlobalProtect endpoint fails the process check after running the configured HIP
remediation process.
This feature enables the app to rerun the HIP remediation script when the
process fails after the set HIP remediation timeout period to help the endpoint recover
from a HIP check failure. The app reruns the remediation script after a process check
failure based on the HIP Process Remediation Retry count you configure through the app
settings of the GlobalProtect portal. When you enable this feature, the GlobalProtect
app resubmits the HIP report only after the app reruns the HIP remediation script in
case of HIP check failures.
For example, if you configure the retry count as 3 and the remediation timeout period as
5 mins in the portal configuration, then every time the endpoint fails the process check
after performing the remediation process, the app runs the script three times and waits
up to 5 mins before it submits the HIP report.
Enhancements for Authentication Using Smart Cards-Removal of Multiple PIN Prompts
Enhancements for Authentication Using Smart Cards-Removal of Multiple PIN
Prompts
When using Connect Before Logon (CBL) with smart card authentication and ActivClient
software, users previously encountered significant friction due to repeated PIN prompts.
This issue occurred on devices where ActivClient software was installed alongside the
GlobalProtect app, forcing end users to enter their smart card PIN multiple times and
hindering the seamless pre-login process. This disruption compromised the reliable and
streamlined access intended by the CBL connection method.
To provide a superior user experience, GlobalProtect® now streamlines smart card
authentication for this specific configuration. This enhancement ensures that the
GlobalProtect app effectively manages the complex interaction between the Windows
identity provider and ActivClient software. Consequently, the end user is prompted to enter their PIN only once. This
single required prompt correctly originates from the ActivClient software, ensuring a
quick, consistent, and uninterrupted connection using the Connect Before Logon
method.
Enhancements for Authentication Using Smart Cards-Authentication Fallback
Enhancements for Authentication Using Smart Cards-Authentication Fallback
When you set smart card authentication for the end users to authenticate to the
GlobalProtect app and when the configured smart card is not available, the user
authentication will now fallback to any other username and password authentication
methods that you have configured for the app.
The smart card authentication fallback will happen only if you have selected the Allow Authentication with User Credentials OR Client
Certificate option while configuring the GlobalProtect gateway and portal.
This option defines whether users can authenticate to the portal or gateway using
credentials and/or client certificates.
Optimize Remote Access with Intelligent Portal Selection
Learn how to get routed to the appropriate Prisma Access portal based on your
location.
When remote users travel extensively or move between disparate network locations, their
GlobalProtect® app often connects to a suboptimal or fixed portal address. This leads to
slower connection times and inconsistent security experiences because the portal is
geographically distant or poorly matched to the user’s current network conditions.
Relying on manually configured or static portal lists introduces unnecessary friction
for mobile workers and reduces overall connection reliability.
To ensure the fastest, most reliable connection for users, GlobalProtect 6.3 introduces
the Intelligent Portal feature. This capability enhances the deployment and connection
experience by automatically selecting the best available portal based on real-time
network conditions and portal availability.
Intelligent Portal is supported for the Always-On and Always-On (Pre-logon) connection
modes. It is also supported for Connect Before Logon if no portal addresses are manually
defined. By automatically choosing the optimal portal, the app eliminates connection
guesswork, thereby improving the user experience and ensuring consistent, high-speed
security enforcement. For information on how to use this feature, see Configure Intelligent Portal.
Connect to GlobalProtect App with IPSec Only
Learn how to choose the connection option for the GlobalProtect app.
For organizations that must comply with government regulations, allowing network clients
to fallback to a less secure tunnel type can pose a compliance risk. Previously, if the
GlobalProtect® app failed to establish an IPSec tunnel, it automatically attempted to
establish an SSL tunnel, potentially circumventing mandatory security policies. This
lack of strict tunnel enforcement could lead to non-compliant access in high-security
environments.
GlobalProtect 6.3.1 addresses this by unifying the control over tunnel mode enforcement
under a single portal setting Advanced Control for Tunnel Mode
Behavior. This new configuration combines the existing Connect with SSL
Only feature with the new ability to enforce IPSec Only connections. For information on
using this parameter, see step 5 in Customize the GlobalProtect App.
You can now meet mandates, such as Federal Government compliance regulations, by
requiring the GlobalProtect app to stay disconnected if the IPSec tunnel fails or is
unavailable on the gateway. This feature ensures that the GlobalProtect app only
connects through the specific, approved tunnel mode your security policy requires,
preventing unauthorized or non-compliant connections. This simplifies configuration by
consolidating tunnel mode preferences in one centralized location.
To meet Federal Government compliance regulations, you can choose to prevent
GlobalProtect fallback to SSL tunnel in case IPSec tunnel fails. If IPSec is not
configured on the gateway, the GlobalProtect app stays disconnected.
GlobalProtect Embedded Browser Upgrade for SAML Authentication
Learn about WebView2.
Prior to GlobalProtect 6.3, users relying on browser-based Security Assertion Markup
Language (SAML) authentication often experienced an inconsistent login workflow and
sometimes required manual steps such as closing the browser window after successful
authentication. In addition, the previous embedded framework lacked robust compatibility
with modern methods like FIDO2.
To deliver a seamless and more secure authentication experience, GlobalProtect® version
6.3 introduces an upgrade to the embedded browser framework for SAML authentication.
This enhancement utilizes Microsoft Edge WebView2 on Windows and WkWebview on macOS.
These components provide a modern, consistent user interface that matches the
GlobalProtect client, thereby eliminating the need for end users to configure a SAML
landing page or manually close the browser after logging in. The transition to WebView2
also ensures compatibility with FIDO2-based authentication methods. For more
information, refer to Microsoft Edge WebView2 documentation.