Prisma Access Agent
Configure Agent Settings for the Prisma Access Agent (NGFW Deployment)
Table of Contents
Expand All
|
Collapse All
Prisma Access Agent Docs
-
-
- Configure the Prisma Access Agent (Coexistence Tenant)
- Set Up the Infrastructure for Prisma Access Agents
- Configure General Global Settings for the Prisma Access Agent
- Configure a Certificate to Decrypt the Authentication Override Cookie (Panorama Managed NGFW)
- Export the Authentication Override Cookie for Connecting to an On-Premises NGFW Gateway (Coexistence Tenant)
- Push the Prisma Access Agent Configuration
-
- Prisma Access Agent Overview
-
- Install the Prisma Access Agent
- Log in to the Prisma Access Agent
- Change Prisma Access Agent App Settings
- Connect the Prisma Access Agent to a Different Location
- Connect the Prisma Access Agent to a Different Server
- View Prisma Access Agent Notifications
- Disconnect the Prisma Access Agent from a Location
- Disable the Prisma Access Agent
- Log out of the Prisma Access Agent
- Get Help for Prisma Access Agent Issues
- Switch Between the Prisma Access Agent and GlobalProtect App
- Prisma Access Agent Commands
Configure Agent Settings for the Prisma Access Agent (NGFW Deployment)
For NGFW deployments, follow the instructions to customize how your end users
interact with the Prisma Access Agent.
The Prisma Access Agent provides default agent configurations that apply to all user
groups. You can add an agent configuration to customize how your end users interact
with the Prisma Access Agent.
Use the following instructions for NGFW (Managed by Panorama) deployments.
- Log in to Strata Cloud Manager as the administrator.
- Select WorkflowsPrisma Access AgentSetup.
- Select Prisma Access AgentAdd Agent Settings.
- Create an app configuration rule. The configuration rule associates users or user groups with app settings that are specific to those users or groups.
- Enter a Name for the rule.
- Specify the Match Criteria by adding User Entities. Users and groups that match the User Entities criteria will receive the Prisma Access Agent app settings that you specify.
- To deploy the configuration to all users, select Match Any.
- To deploy the configuration to specific user groups or users, select Match Users. Then, click Select Users to select from the list of user entities. Examples of user entities include usernames and user groups, which are available in cloud directory attributes such as Common Name (CN) and Domain Component (DC).
- Configure the app settings for the Prisma Access Agent.You can configure the following app settings:
- Connect—Specify how the Prisma Access Agent connects to Prisma Access. This setting is required.
- Select Every time the user logs on to the machine (Always on) to automatically establish a connection to Prisma Access every time the user logs on to an endpoint.
- Select Only when the user clicks Connect (On demand) to connect to Prisma Access only when the user clicks Connect (the lock icon) in the Prisma Access Agent app.
- Disable Agent—Specify whether to give your users the ability to disable the Prisma Access Agent on their devices. In cases where users have the GlobalProtect™ app installed on their device along with the Prisma Access Agent, they can conveniently disable the Prisma Access Agent so that they can switch to the GlobalProtect app to avoid interference between the two software. Select one of the following options:
- Disallow—Users can't disable the Prisma Access Agent using the Prisma Access Agent app. The Disable link isn't available in the settings page in the Prisma Access Agent app.
- Allow—Users can disable the Prisma Access Agent using the Disable link in the settings page in the Prisma Access Agent app. This is the default.
After disabling the agent, the user can switch to the GlobalProtect app. The following table shows the Prisma Access Agent behavior after disabling the agent and after switching to GlobalProtect.Prisma Access Agent Behavior After Disabling Prisma Access Agent After Switching to GlobalProtect Connectivity to the tunnel No No Connectivity to the server (Prisma Access Agent management plane) Yes Yes Prisma Access agent Notifications No No Prisma Access Agent enforcer No No, but GlobalProtect enforcer is enabled ADEM Access Experience status Yes (independent of agent status) Yes (independent of agent status) Troubleshooting by remote shell Yes Yes Anti-tamper feature Yes Yes PACli commands functional Yes, but don't use pacli connect Yes, but don't use pacli connect - Allow user to sign out—Enable this setting to permit your users to sign out of the Prisma Access Agent. Default: Disabled.
- Support Page—Enter the website that users can access for assistance when they click Support Resources in the Prisma Access Agent.Default: The website for the Prisma Access Agent documentation.
- Append Local Search Domains to Tunnel DNS Suffixes (Mac only)—Enable this setting to append tunnel DNS search domains to local DNS search domains on macOS endpoints. Appending tunnel search domains to an endpoint's local DNS search domains enables users to quickly access local and remote corporate websites and servers that they visit frequently without entering the complete address.
- Optimized MTU—The maximum transmission unit (MTU) is the largest packet size that Prisma Access Agent can send in a packet during a transmission. When enabled, Prisma Access Agent will automatically determine the best MTU to use for packet transmissions.Default: Enabled. You can disable this option to manually configure the MTU. The Configurable MTU (bytes) range is 576-1500 bytes. If you set a value outside this range or don't specify a value, the system will default to 1400 bytes.
- (Optional) Configure the Proxy settings.
- Detect Proxy for each Connection (Windows Only)(Optional)—Enable this setting to automatically detect the proxy at every connection. Disable this setting if you want to automatically detect the proxy for the gateway connection and use that proxy for subsequent connections to the gateway. Default: Disabled.
- Configure MFA settings.
- Inbound Authentication Prompts from MFA Gateways—To support multi-factor authentication (MFA), a Prisma Access Agent endpoint must receive and acknowledge UDP prompts that are inbound from the gateway. Enable this setting to allow a Prisma Access Agent endpoint to receive and acknowledge the UDP prompts. This setting is enabled by default. Disable this setting to block UDP prompts from the gateway.
- Network Port for Inbound Authentication Prompts (UDP)—Specifies the port number a Prisma Access Agent endpoint uses to receive inbound authentication prompts from MFA gateways. The default port is 4501. To change the port, specify a number 1-65535.
- MFA Trusted Host list—Add the hosts for firewalls or authentication gateways that a Prisma Access Agent endpoint can trust for multi-factor authentication. When an endpoint receives a UDP message on the specified network port, the Prisma Access Agent displays an authentication message only if the UDP prompt comes from a trusted gateway.
- Inbound Authentication Messages—Customize a notification message to display when users try to access a resource that requires additional authentication.When users try to access a resource that requires additional authentication, Prisma Access Agent receives a UDP packet containing the inbound authentication prompt and displays this message. The UDP packet also contains the URL for the Authentication Portal page you specified when you configured multi-factor authentication. Prisma Access Agent automatically appends the URL to the message.For example:
You have attempted to access a protected resource that requires additional authentication. Do you want to continue?
The message can have 255 or fewer characters. - Suppress Multiple Inbound MFA Prompts (sec)—Specify the number of seconds to wait before Prisma Access Agent can suppress multiple inbound UDP prompts. The default is 180 seconds.
- Configure ADEM settings.
- Access Experience (Optional)—Specify whether to install the ADEM Access Experience agent during the Prisma Access Agent app installation and to let end users enable or disable user experience tests from the app.
- Install
- No action (The agent state remains as is)
- Uninstall
Default: No action (The agent state remains as is) - Display ADEM update notifications—Enable this setting to display notifications from ADEM when an update is available on the endpoint.
- Enable Internal Host Detection if you don’t require your Prisma Access Agent users to connect to the gateway when they are on the internal network. This option will enable the Prisma Access Agent to determine if it's on an internal or external network.Default: DisabledAfter you enable this option, complete the following steps:
- Enter the IP Address (IPv4) of a host that Prisma Access Agent can resolve from the internal network only.
- Enter the DNS HostName that resolves to the IP address that you entered.
- Configure external and internal gateways for the Prisma Access Agent by selecting the external and internal gateways that you configured in the Infrastructure tab.
- (Optional) Select a Forwarding Profile that you configured previously to manage how traffic flows between the agent and Prisma Access. For example, you can set up split tunnels to exclude traffic from certain applications or destinations from the tunnel while routing all other traffic through the tunnel.
- When you have finished setting up the Prisma Access Agent settings, click Create.