Integrate Prisma Access with Microsoft Defender for Cloud Apps
Focus
Focus
Prisma Access

Integrate Prisma Access with Microsoft Defender for Cloud Apps

Table of Contents

Integrate Prisma Access with Microsoft Defender for Cloud Apps

Learn how to integrate Prisma Access with Microsoft Defender for Cloud Apps.
Where Can I Use This?
What Do I Need?
  • Prisma Access (Cloud Management)
  • Minimum Required Prisma Access Version: 4.2
Integrate Prisma Access with Microsoft Defender for Cloud Apps to sync unsanctioned applications and block them inline using Prisma Access automatically. After you integrate Microsoft Defender for Cloud Apps with Prisma Access, Prisma Access creates a block Security policy for URLs that are blocked in Microsoft Defender for Cloud Apps. You can view the list of unsanctioned applications after configuring the integration settings. You can sync up to 25,000 applications in this integration.
Complete the following steps to integrate Prisma Access with Microsoft Defender for Cloud Apps:
  1. Enable this functionality.
    Contact your Palo Alto Networks account representative or partner, who will submit a request.
  2. In Strata Cloud Manager, select
    Manage
    Configuration
    NGFW and Prisma Access
    .
  3. Set the
    Configuration Scope
    to
    Global
    , and select
    Global Settings
    SaaS Application Endpoints
    .
  4. Navigate to
    MS Defender for Cloud Apps
    .
  5. Edit the
    Microsoft Defender for Cloud Apps
    settings.
    1. Enter details in all the required fields.
      View the
      Microsoft Defender for Cloud Apps
      overview to obtain the required details.
    2. Check the Connectivity
      .
    3. Save
      the settings after the connection is a success.
      You can save the settings only after the connection is a success. The integration automatically creates a Security policy and a custom URL category to block the unsanctioned apps.
  6. View Unsanctioned Apps
    .
    You can view up to 25,000 unsanctioned applications. The latest list of unsanctioned apps appears every time you
    View Unsanctioned Apps
    .
    If the list does not appear, reconfigure the integration settings, and check the connectivity again as mentioned in step 5.
  7. Enable the Security policy.
    Prisma Access creates a Security policy after you configure the integration.
    1. Select
      Security Services
      Security Policy
      .
    2. Set the
      Configuration Scope
      to
      Prisma Access
      .
    3. Confirm the Prisma Access web Security policy rules and the pre-rule Security policy rules.
      A
      Block Unsanctioned MS Defender Apps
      web Security policy and pre-rule Security policy, with the same name, are created.
      Prisma Access uses these rules to block the URLs of unsanctioned apps.
    4. Select the Security policy rules and
      Enable
      them.
    5. (
      Optional
      ) Create a Security policy if required and enable it.
      Select the
      Unsanctioned MS Defender Apps
      URL category.
    6. Push
      the changes.
  8. (
    Optional
    ) Customize the
    Microsoft Defender for Cloud Apps
    integration settings.
    1. Click the settings and select
      Customize
      .
    2. Edit the settings.
    3. Check the Connectivity Again
      .
    4. Save
      the changes.
  9. (
    Optional
    ) Delete the integration.
    1. Click the settings and select
      Delete Integration
      .
    2. Confirm
      Delete Integration
      .
    3. Delete the Security policy rules created to block the URLs of unsanctioned apps.
      If you reconfigure the integration, Prisma Access does not create default Security policy rules. However, you can select the
      Unsanctioned MS Defender Apps
      URL category for the Security policy rules you create.
    4. Push
      the changes.

Recommended For You