New Features in Prisma Access 4.2
Focus
Focus
Prisma Access

New Features in Prisma Access 4.2

Table of Contents

New Features in Prisma Access 4.2

Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • Minimum Required Prisma Access Version 4.2 Preferred
The following table describes the new features that will be available with Prisma Access 4.2 Preferred.

Prisma Access Application Name Update

November 18, 2023
The application tile name on the hub for Prisma Access is now changed to Strata Cloud Manager.
The application tile names on the hub for Prisma Access, Prisma SD-WAN, and AIOps for NGFW (the premium app only) are now changed to Strata Cloud Manager. With this update, the application URL has also changed to stratacloudmanager.paloaltonetworks.com, and you’ll also now see the Strata Cloud Manager logo on the left navigation pane.
Moving forward, continue using the Strata Cloud Manager app to manage and monitor your deployments.

Cisco Catalyst SD-WAN Integration

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting October 2023
To use Cisco Catalyst SD-WAN with Prisma® Access, you needed to create remote networks and IPSec tunnels manually. You can now onboard a remote network using IPSec tunnels between Cisco Catalyst SD-WAN and Prisma Access automatically. This feature automatically discovers eligible sites, creates the necessary remote networks, and establishes IPSec tunnels between Cisco Catalyst SD-WAN and Prisma Access, which significantly reduces manual configuration time and enables faster deployment.
Contact your Palo Alto Networks account representative to enable this functionality. After you enable the automatic creation of tunnels, configure the settings to establish the connection between Prisma Access and Cisco Catalyst SD-WAN. View the discovered sites that are eligible for the integration, and enable them accordingly. This creates remote networks and establishes IPSec tunnels. Ensure to follow all the requirements and prerequisites before you enable this functionality.

Credential Phishing Prevention Support

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting September 2023
  • Prisma Access (Managed by Panorama) starting with release 4.2
Phishing websites are fraudulent sites designed to steal user credentials and gain access to your network. To defend against these attacks, it's critical to prevent the submission of corporate credentials to unsanctioned sites. Prisma® Access 4.2 introduces credential phishing prevention for Panorama® managed and Cloud managed deployments, helping you secure remote networks.
You can restrict where users submit corporate credentials by specifying the action taken (alert, allow, block, or continue) when Prisma Access detects submissions to specific URL categories. The continue action, for example, presents a response page that warns users about potential account compromise and requires them to acknowledge this risk before they can proceed to the requested site.
Credential phishing prevention works by scanning username and password submissions for valid corporate credentials using your chosen credential detection method. While some methods focus only on usernames, the domain credential filter method validates both usernames and passwords against a directory server. Each detection method varies in detection ability and requires a different User-ID™ configuration. When Prisma Access detects a valid corporate credential submission, it enforces the appropriate Security policy rule.

Prisma Access PAC File Endpoint for Explicit Proxy

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting September 2023
  • Prisma Access (Managed by Panorama) starting with release 4.2
Organizations often face administrative and security challenges managing firewall exceptions and allow lists for the existing AWS S3-hosted PAC file. Prisma® Access solves this problem by rolling out a new, simplified PAC file endpoint hosted directly by Palo Alto Networks, significantly reducing administrative overhead and simplifying access.
This change is designed to make it easier for you to enable access to PAC files and will be automatically reflected when you modify your PAC file.
GlobalProtect Migration Guidance
If you are using GlobalProtect ® in proxy mode or tunnel and proxy mode, and your devices cannot access all domains under prismaaccess.com (due to a third-party VPN split tunnel or firewall rule), allow your devices to access the new PAC file endpoint (store.swg.prismaaccess.com) to avoid interruptions. For full migration instructions, including required IP addresses and steps for overriding the PAC File URL in GlobalProtect® App Settings, you can refer the PAC file guidelines.

User-Based Enforcement for Explicit Proxy Kerberos Authentication

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting September 2023
  • Prisma Access (Managed by Panorama) starting with release 4.2
Achieving consistent user identity-based control for undecrypted HTTPS traffic using Kerberos authentication was previously impossible in Prisma® Access forcing administrators to accept inconsistent policy enforcement. This new feature solves that challenge by allowing you to implement user identity-based visibility and control using security policies for undecrypted HTTPS traffic when a user or system authenticates using Kerberos.
This functionality ensures consistent user visibility and policy enforcement for all HTTP-based traffic (undecrypted HTTPS, decrypted HTTPS, and HTTP traffic). Furthermore, administrators no longer need to configure Trusted Source Addresses, which simplifies your initial configuration and supports the use case in which your branch locations employ dynamic egress IP addresses. Previously, you could authenticate decrypted and undecrypted traffic, but enforcement was limited to decrypted HTTPS traffic. Now, all HTTP-based traffic can authenticate and undergo consistent user-based controls. This feature also eliminates the requirement for users or systems to come from static IP addresses configured as Trusted Source Addresses, simplifying initial configuration and supporting dynamic IP addresses.

Local Zone Additions

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting September 2023
  • Prisma Access (Managed by Panorama) starting with release 4.2
Local zones place compute, storage, database, and other services close to large population and industry centers. These locations have their own compute locations.
Keep in mind the following guidelines when deploying local zones:
  • Local zone locations do not support IPv6.
  • Local zone locations do not use Palo Alto Networks registered IP addresses.
  • 1 Gbps support for remote networks is not supported.
  • Remote network and service connection node redundancy across availability zones is not available if you deploy them in the same local zone, as both nodes are provisioned in a single zone.
  • These local zones do not use Palo Alto Networks registered IPs. If you have problems accessing URLs, report the website issue using https://reportasite.gpcloudservice.com/ or reach out to Palo Alto Networks support.
  • Some SaaS applications might experience a higher latency in local zones when compared with non-local zone locations.

Enterprise DLP Support for AI Applications

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting September 2023
  • Prisma Access (Managed by Panorama) starting with release 4.2
ChatGPT is the fastest growing consumer application in history, with 100 million monthly active users just two months after launch. Many organizations may be surprised to learn that their employees are already using AI-based tools to streamline their daily workflows, potentially putting sensitive company data at risk. Software developers can upload proprietary code to help find and fix bugs, while corporate communications teams can ask for help in crafting sensitive press releases.
To safeguard against the growing risk of sensitive data leakage to AI apps and APIs, we are excited to announce a new set of capabilities to secure ChatGPT and other AI apps as part of our Next-Generation CASB solution that includes: Comprehensive app usage visibility for complete monitoring of all SaaS usage activity, including employee use of new and emerging generative AI apps that can put data at risk. Granular SaaS application controls that safely enable employee access to business-critical applications, while limiting or blocking access to high risk apps—including generative AI apps—that have no legitimate business purpose.
While AI apps can significantly boost productivity and creative output, they also pose a serious data security risk to modern enterprises. Enterprise Data Loss Prevention (E-DLP) provides advanced data security that provides ML-based data classification and data loss prevention to detect and stop company secrets, personally identifiable information (PII), and other sensitive data from being leaked to generative AI apps by well-intentioned employees.

New Prisma Access Location

Supported in:
  • Prisma Access (Managed by Strata Cloud Manager) starting September 2023
  • Sweden
  • Kazakhstan
  • Qatar
  • Senegal