New Features in February 2026
Focus
Focus
Strata Cloud Manager

New Features in February 2026

Table of Contents

New Features in February 2026

Here are the new features we've added to Strata Cloud Manager in February 2026.

New Strata Cloud Manager Management Features (February 2026)

See the new configuration management features we've added to Strata Cloud Manager in February 2026.
Here's the new configuration management features we've added to Strata Cloud Manager in February 2026; we use a scheduled upgrade to deliver these features to you and they are supported with the Strata Cloud Manager 2026.R1.0 release version. Check your Strata Cloud Manager in-product notifications for updates on the release upgrade schedule. You can verify which Strata Cloud Manager release version you're running by navigating to your configuration overview, and checking the Cloud Management Version.

Compare Migration Changes with Enhanced Configuration Diff

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Please contact your account team to enable the feature.
Identifying and understanding configuration discrepancies during a firewall migration is difficult when you view raw XML differences without context. The new configuration diff feature for Panorama® migration to Strata™ Cloud Manager provides categorized and searchable comparisons during your migration workflow. When you migrate your configurations to Strata Cloud Manager, you can view differences organized into meaningful categories rather than raw data. This feature tracks three types of changes:
  • Unsupported objects: Identifies objects not supported to show parity gaps with Panorama features.
  • Modified or deleted objects: Shows changes between the pushed and running configurations.
  • Name changes: Tracks objects whose names changed during the migration process.
By listing the object names and types for each difference, this feature helps you understand the impact of configuration changes without needing technical knowledge of complex XML structures.

Auto Snippet Association

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Please contact your account team to enable the feature.
Migrating complex Panorama® configurations to Strata Cloud Manager often involves time-consuming manual effort to map templates and folders. The auto snippet association feature solves this challenge by automatically generating and associating configuration snippets with folders during the migration process. When you migrate from Panorama to Strata Cloud Manager, the feature transforms device groups into folders and converts templates into snippets, eliminating the need for manual validation.
You benefit from this feature particularly when managing large-scale deployments where templates are referenced across multiple device groups or where template stacks contain overlapping configurations. By automating these associations, you significantly reduce migration time and minimize configuration errors. This ensures your migrated configuration maintains the same operational behavior as your original Panorama setup while being optimized for the folder-based management model in Strata Cloud Manager.

Per-Admin Configuration Push and Revert

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Please contact your account team to enable the feature.
In shared environments, concurrent configuration changes by multiple administrators can lead to conflicts where a single error traditionally requires reverting all uncommitted changes. Strata Cloud Manager addresses this challenge by moving beyond the traditional all-or-nothing commit model to offer precise control in multi-administrator environments.
You can now selectively revert uncommitted changes made by specific administrators within defined scopes or within designated containers, cloud containers, on-premises containers, and snippets. This feature allows you to revert specific uncommitted changes from the candidate configuration while preserving other administrators' work. In addition to reverting changes, you can perform partial configuration pushes to deploy only the changes within your selected scope to designated device.
To ensure deployment accuracy, you can preview changes before you revert or push them. The system provides detailed information about dependencies that might prevent the operation, allowing you to resolve issues before deployment.
You cannot use selective push or revert and must perform all-admin push in the following scenarios:
  • Configuration load operations.
  • Changes in container hierarchy, such as snippet association or disassociation.
  • Internal commits triggered by tenant upgrades.
  • When the number of uncommitted changes exceeds 500.

Multiple Virtual System Support on SCM

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Please contact your account team to enable the feature.
Strata Cloud Management (SCM) now supports multiple virtual system (vsys) mode for Next-Generation Firewalls, enabling you to manage and configure multiple virtual systems within a single physical firewall from SCM. Virtual systems are separate, logical firewall instances within a single physical Palo Alto Networks firewall. Rather than using multiple firewalls, managed service providers and enterprises can use a single pair of firewalls (for high availability) and enable virtual systems on them. Each virtual system is an independent, separately-managed firewall with its traffic kept separate from the traffic of other virtual systems.This feature allows you to create logical separations within a firewall to support multiple departments, customers, or security domains while maintaining centralized management. When you enable multi-vsys mode, you can create, update, and delete virtual systems, import interfaces into specific virtual systems, and push configurations to one or multiple virtual systems simultaneously.
With multi-vsys support, you can logically separate traffic, policies, and objects for different business units or customers, providing enhanced multi-tenancy capabilities. You can delegate administration to different teams by associating virtual systems with appropriate containers, allowing fine-grained access control to specific virtual systems. The ability to push configurations to multiple virtual systems at once simplifies management of complex multi-vsys environments.
This feature is particularly valuable for service providers who need to maintain separation between multiple customer environments on shared hardware, enterprises that want to isolate different departments or business units, or organizations that need to maintain strict separation between production, development, and testing environments. By implementing virtual systems, you can optimize hardware utilization while maintaining logical separation and meet compliance requirements that mandate traffic isolation between different security domains.
SCM provides an intuitive interface for managing virtual systems, allowing you to view the status of all virtual systems, move virtual systems between containers, and monitor the synchronization status of each virtual system separately. When pushing configurations, you can select which virtual systems should receive updates, providing flexibility in configuration management.

Trusted Source Address Support

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Strata Cloud Manager now allows you to configure Trusted Source Addresses to enhance the security of Explicit Proxy deployments. This feature enables you to specify exactly which source IP addresses are permitted to authenticate using the X-Authenticated-User (XAU) protocol. When enabled, the firewall trusts XAU headers contained in incoming requests only if they originate from the IP addresses you have explicitly defined, preventing unauthorized sources from successfully using XAU for authentication,.
You can manage this security measure by creating an address object for the IP you wish to trust and adding it to the Trusted Source Address configuration. The feature includes options to enable the configuration and add, search, or delete trusted source addresses as required.

DNS Rewrite with Conditions Check

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
You can now configure DNS rewrite conditions in Strata Cloud Manager to control when DNS address translation occurs based on the DNS client's characteristics. This feature allows the firewall to perform address translation based on the specific characteristics of the DNS client rather than applying a global, static rule. By evaluating the requester’s source zone or source address against criteria defined in NAT rules, the system determines whether a DNS response should be modified. This ensures that DNS resolution is dynamically tied to the network context of the requesting device.
This capability is primarily used to provide granular infrastructure control. In many network architectures, a single hostname must resolve differently depending on the origin of the request. With conditional rewrites, internal users originating from a trusted zone can be directed to private IP addresses for direct internal routing. Simultaneously, external users or guests from untrusted zones receive the original public IP address. This segmentation prevents the exposure of internal IP schemes to unauthorized network segments, strengthening the security posture.
Additionally, this feature consolidates policy management. By integrating the rewrite logic directly into existing DNAT rules, administrators can avoid the complexity of maintaining separate DNS entries or multiple layers of firewall rules for internal and external traffic. This unified approach simplifies policy auditing and reduces the potential for configuration errors across the network.

New NetSec Platform Features on Strata Cloud Manager (February 2026)

See all the new features made available for Strata Cloud Manager in February 2026.
These new features follow the Strata Cloud Manager release model of continuous feature deployment; as they're ready, we make them available to ensure the latest support for all products and subscriptions across the NetSec platform. There's no Strata Cloud Manager upgrade or management version requirement associated with these features; however, check if they have version or license dependencies associated with other parts of the NetSec platform (like a cloud-delivered security service subscription, or a Prisma Access version, for example).

Custom HIP Checks for Prisma Access Agent for Linux

Feb 10, 2026
Supported for:
  • Strata Cloud Manager
The Prisma® Access Agent for Linux now supports custom Host Information Profile (HIP) checks that enable you to collect specific endpoint data beyond standard HIP categories. You can define custom checks to determine if particular processes are running on endpoints by examining a process list. This capability allows you to enforce granular access policies based on criteria unique to your environment that standard HIP checks might not address. The custom HIP data integrates seamlessly with existing workflows as it becomes part of the raw host information that the agent submits to the gateway for policy evaluation.

Incident Customization for Prisma Access Infrastructure Monitoring

Feb 5, 2026
Supported for:
  • Strata Cloud Manager
Generic detection rules often fail to match specific operational requirements when monitoring Prisma® Access infrastructure. To address this, the incident customization feature in Strata Cloud Manager allows you to define custom raise and clear conditions for tunnel, BGP connectivity, and site capacity incidents through the Unified Incident Framework. This capability gives you granular control over when Strata Cloud Manager generates and resolves incidents based on your unique environment.
You can configure specific time-based thresholds for detecting infrastructure issues across your remote network and service connection deployments. You can define the duration a resource, such as a tunnel or BGP, must be down before an incident is raised, and conversely, the length of time it must be up before that incident is cleared. This flexibility ensures that transient issues do not generate unnecessary alerts while still capturing genuine problems. The feature integrates object-based filtering, enabling you to apply different thresholds to specific sites or BGP peers. Strata Cloud Manager performs a longest-match evaluation against your resource hierarchy, meaning you can set conservative default thresholds for your entire infrastructure while defining more aggressive detection parameters for mission-critical connections.

NGFW Incidents in February

Feb 5, 2026
Supported for:
  • Strata Cloud Manager
Here are the NGFW incidents introduced in February 2026.
  • Unofficial URL for Cloud Services
  • Unofficial URL for Application Database
  • Unofficial URL for WildFire | Advanced WildFire
  • Unofficial URL for PAN-DB URL Filtering | Advanced URL Filtering
  • Fan Issues
  • Terminal Server agent Self-signed Certificate Expiration
  • Delayed Telemetry
  • Card Failure: Card start timeout - Max restarts attempted
  • Card Failure: Path monitor failure - Max restarts attempted
  • Card failure with reason "Slot runtime software failure - Max restarts attempted"
  • DHCP Client IPv4 address Assignment Failure
  • FE100 Failure
  • Fatal Machine Check Failure
  • Incompatible SFP Media Type
  • Logging Drive Failure
  • MPC Card - CPLD Failure
  • Mismatch of Server Group Mapping Users and Groups between LDAP and PAN-OS Device
  • NGFW received BGP Routes beyond the configured max Prefixes
  • NPC Card - FE100 Failure
  • PA-5450 NC card - FE100 Failure
  • Port Failure
  • User Group Usage in Policies exceeding the supported limit
Health incidents actively monitor the health and performance of your platform in real time. This approach helps in identifying issues, predicting potential problems, and implementing remediation actions to ensure your devices function optimally. Here are some key aspects:
  • Monitoring Metrics: Continuously monitor various metrics from the NGFWs, including CPU utilization, memory usage, disk space, network throughput, and other relevant performance indicators.
  • Anomaly Detection: Generate alerts that dynamically adjust based on the metric's historical value and your usage trends.
  • Predictive Analysis: Leverage historical data and patterns to predict when thresholds might be exceeded or specific events may occur. This helps forecast potential issues before they escalate.

ServiceNow Integration with OAuth Authentication

Feb 5, 2026
Supported for:
  • Strata Cloud Manager
Storing and transmitting direct user credentials for third-party integrations creates significant security risks and often violates organizational compliance policies. To solve these vulnerabilities, OAuth 2.0 authentication for ServiceNow integrations in Strata Cloud Manager provides a secure, token-based mechanism that eliminates the need to transmit sensitive passwords directly. This feature, part of Strata Cloud Manager, allows you to leverage industry-standard protocols to establish secure connections without exposing username and password combinations in your notification profiles.
The client credentials grant type implementation allows you to authenticate using client ID and client secret pairs. Strata Cloud Manager automatically handles access token acquisition and renewal, ensuring your incident management workflows continue without manual intervention. Because tokens have limited lifespans and are easily revocable, this approach offers superior protection compared to basic authentication. You can implement least-privilege access patterns, ensuring the integration only receives the minimum permissions necessary for ticket management.
Organizations with strict security mandates benefit from improved audit trails and granular access control. You can migrate existing ServiceNow notification profiles from basic authentication to OAuth seamlessly, maintaining your current incident management workflows while significantly enhancing your credential security posture.

Automated Tag-Based Security

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
  • Please contact your account team to enable this feature.
When you deploy workloads in cloud environments, those workloads frequently scale up and down with changing demand. If you write firewall security policies using static IP addresses, you must manually update those policies every time your teams deploy new services or scale existing ones. This creates a gap between how quickly your infrastructure changes and how quickly your security policies can adapt, leading to either security risks from overly permissive rules or operational problems from blocked legitimate traffic.
Automated Tag-based Security solves this problem by automatically collecting tags from your cloud workloads and making them available to your firewalls through Dynamic Address Groups. Instead of writing policies based on IP addresses, you write policies based on workload identity using the same tags your teams already apply in AWS, Azure, GCP, or Kubernetes. When workloads scale up or down, your security policies continue to apply correctly without manual intervention.
You connect your cloud provider accounts, create monitoring definitions that specify which tags to collect, then configure which firewalls should receive those tags. After you commit your changes, the system automatically begins distributing tags to your firewalls. As new firewalls join folders with distribution settings configured, they automatically begin receiving the appropriate tags without manual configuration. Similarly, when firewalls leave those folders, the system automatically removes the associated tags, ensuring your security policies remain aligned with your current infrastructure.

Decryption Port Mirroring

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Historically, organizations requiring comprehensive traffic capture for forensic or historical purposes faced limited options: deploy costly standalone SSL/TLS decryption appliances, rely on solutions that provide incomplete visibility, or accept the visibility gaps caused by encrypted traffic.
Decryption Port Mirroring eliminates these tradeoffs by providing a solution that improves your security monitoring, incident response, and data retention. When enabled, your Next-Generation Firewall (NGFW) forwards cleartext copies of decrypted SSL/TLS and SSH proxy traffic to external traffic collection or analysis tools through a configured Ethernet interface. No other specialized hardware is required.
You can mirror traffic before or after Security policy rule enforcement to meet your specific needs. By default, the NGFW mirrors all decrypted traffic before policy enforcement. This enables security teams to replay events and analyze traffic that generated a threat or was dropped by the firewall. Post-enforcement mirroring excludes dropped packets, which reduces false positives on third-party data loss prevention (DLP) or intrusion prevention system (IPS) devices.
Decryption Port Mirroring is supported on all hardware and VM-Series NGFWs and requires the free Decryption Port Mirroring license.

DNS Resource Record Type Control for Advanced DNS Security

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Nov 16, 2022
Supported on NGFW:
  • First introduced in PAN-OS 11.0.
Threat actors leverage specific DNS queries to bypass security filters or conduct network reconnaissance. For example, SVCB (Type 64) and HTTPS (Type 65) records can facilitate encrypted connections that evade traditional inspection, while ANY (Type 255) queries allow attackers to retrieve all known record types to map your internal network. Without the ability to distinguish and control these specific record types, your organization remains vulnerable to sophisticated evasion techniques and information gathering.
Palo Alto Networks now provides the option in Strata Cloud Manager to block ECH (Encrypted Client Hello), which is a draft state proposal to encrypt the entire ‘client hello’ message. This includes SVCB (Type 64), HTTPS (Type 65), and ANY (Type 255) DNS record types. While enabling ECH offers some data privacy, such as ALPN and SNI, it can also prevent certain firewall services that use the client hello from operating as intended. To maintain optimal function of the security services of the firewall, Palo Alto Networks recommends blocking all ECH-supporting record types.

Load-Balanced DNS Support for FQDN Objects

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Many application servers use load-balanced DNS to return only a subset of resolved IP addresses per query, which can cause security policy match failures unless the firewall maintains an aggregate list of all valid IP addresses. Strata™ Cloud Manager now supports the Load Balanced DNS setting for fully qualified domain name (FQDN) address objects to ensure your Security policy rules consistently match traffic for distributed cloud services and load-balanced application environments.
When enabled, the network security platform maintains an aggregate list of up to 100 resolved IP addresses per domain that have not yet reached their time-to-live (TTL) expiration. Instead of a replacement logic, this intelligent maintenance ensures that all valid source and destination IPs returned across multiple DNS queries are available for policy enforcement. The system uses an intelligent retry interval that doubles if no changes are detected, allowing the IP list to refresh without impacting management plane performance. This ensures your security posture remains robust even for applications with highly dynamic or distributed IP pools.

NGFW Log Forwarding for Management Plane Logs

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Strata Cloud Manager now supports forwarding next-generation firewall (NGFW) management plane logs to external destinations, for monitoring, archiving, and analysis. This feature extends existing visibility beyond data plane traffic.
You can configure forwarding for System, Config, User-ID™, IP-Tag, HIP Match, and GlobalProtect® log types to Syslog, HTTP, SNMP, and email servers. You can apply granular filters based on severity and event attributes to monitor administrative activity, system health, and user mapping events within your centralized logging infrastructure.

PA-505 and PA-510 Next-Generation Firewalls

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
The PA-505 and PA-510 firewalls upgrade the capabilities of earlier PA-400 Series models with targeted enhancements for small branch offices, retail locations, and managed security service environments. The PA-505 features seven RJ-45 ports and the PA-510 features eight RJ-45 ports for connectivity. These platforms have threat performance of 800 Mbps to 1.2 Gbps. The PA-505 in particular includes upgraded memory from 8GB to 16GB and increased storage from 64GB to 128GB. Both of these models support local logging, Zero Touch Provisioning (ZTP), and high availability deployments.
The PA-505 and PA-510 are first supported on PAN-OS® version 12.1.3. You can manage these firewalls through multiple interfaces including CLI, Firewall Web Interface, Panorama, and Strata Cloud Manager.

Post-Quantum Cryptography (PQC) Support for TLSv1.3 Inline Decryption

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Adopting post-quantum cryptography (PQC) is critical to protecting your organization and its assets against future quantum computers, which will break today’s classical cryptography. Failure to adopt PQC early increases the risk of compromise of sensitive data with attacks like Harvest Now, Decrypt Later already under way. On the other hand, upgrading legacy applications and systems is a time-consuming and costly process that risks service disruption and data security without proper guardrails in place. Accounting for these concerns, PAN-OS® 12.1 adds support for securing TLSv1.3 sessions using post-quantum (PQ) key encapsulation mechanisms (KEMs) to SSL Forward Proxy, SSL Inbound Inspection, Decryption Mirror, and the Network Packet Broker features.
In decryption profiles, you can enable PQ KEMs standardized by the National Institute of Standards and Technology (NIST) or nonstandardized, experimental options. You can also specify if your selected algorithms are preferred by the client-side, server-side, or both. Next-Generation Firewalls (NGFWs) now serve as cipher translation proxies, translating between PQC and classical encryption for applications that are not yet post-quantum ready. For example, you can use quantum-safe encryption for communications between end users and NGFWs but classical encryption for connections between an NGFW and applications.
This solution secures both legacy and quantum-safe systems and applications, enables you to meet PQC mandates, and reduces stress and complexity around PQC upgrades.

Post-Quantum Cryptography (PQC) TLS Support for Management Plane

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Future quantum computers will break today's encryption. Adversaries are taking advantage by stealing encrypted data today to decrypt once a cryptographically relevant quantum computer (CRQC) is available. This "Harvest Now, Decrypt Later" strategy requires a proactive response. Management connections are prime targets for adversaries because the encrypted traffic contains sensitive, long-lived data such as login credentials and configuration details. To defend against the quantum computing threat, PAN-OS® 12.1 now supports post-quantum cryptography (PQC) for administrative access to Next-Generation Firewalls (NGFWs) and Panorama®. This feature protects TLSv1.3 management connections using quantum-resistant algorithms standardized by the National Institute of Standards and Technology (NIST).
SSL/TLS service profiles now offer ML-KEM (Module-Lattice-based Key-Encapsulation Mechanism), the post-quantum key exchange algorithm specified in FIPS 203. The NGFW or Panorama ensures interoperability by automatically negotiating a supported classical algorithm if a web browser doesn't support PQC. You can also enable hybrid post-quantum key exchange, which combines a classical algorithm like ECDH with a post-quantum algorithm to generate a shared key. Hybrid key exchange secures your organization from attacks by today's classical computers and future CRQCs. These capabilities prevent disruption to critical operations and ease your transition to PQC.
You can also generate certificates using the NIST-approved digital signatures: ML-DSA (Module-Lattice-based Digital Signature Algorithm) and SLH-DSA (Stateless Hash-based Digital Signature Algorithm). These algorithms are specified in FIPS-204 and FIPS-205, respectively. PQC certificates are for testing only while industry standards are under development.

Zero Touch Provisioning Over Cellular

Feb 6, 2026
Supported for:
  • Strata Cloud Manager
Zero Touch Provisioning (ZTP) can now use cellular interfaces to automatically deploy and configure NGFW (Managed by Panorama or Strata Cloud Manager) in remote locations with limited connectivity or lacking traditional wired connections.
ZTP now supports multiple connectivity scenarios, including cellular-only, ethernet-only, and hybrid connectivity. This provides the flexibility to adapt to various network environments, particularly distributed networks, retail locations, or temporary sites where traditional wired connectivity might be unavailable. This capability integrates directly with existing workflows to maintain management consistency and enable efficient remote deployment without requiring on-site IT intervention. Built to support current and future 5G-enabled platforms, ZTP over Cellular ensures long-term adaptability and reduced operational costs by streamlining the secure onboarding of remote assets.
ZTP over cellular interfaces are supported on devices running PAN-OS 12.1.2 and later.

ZTP Installer Web Application

Feb 6, 2026
This is a Beta feature Supported for:
  • NGFW (Managed by Strata Cloud Manager)
You can now activate Palo Alto Networks NGFWs at branch locations using the ZTP NGFW Activation web app that extends the existing Zero Touch Provisioning (ZTP) capabilities to mobile devices. This solution enables field installers to complete NGFW onboarding and activation without requiring technical expertise or detailed knowledge of customer network configurations. The web app is browser-based and supports both iOS and Android devices, eliminating the need for separate native applications while maintaining full compatibility with existing ZTP workflows.
The ZTP NGFW Activation web app allows for QR code scanning functionality on Gen 5 or newer hardware that automatically populates device-specific information including Serial Numbers and Claim Keys directly from labels affixed to the NGFW hardware. When you scan a QR code using your mobile device's camera, the QR code contains an embedded URL that redirects you to the ZTP Activation Page along with the Serial Number and Claim Key data. The application automatically populates these fields from the scanned QR code data, and you simply need to initiate the ZTP activation process for the device.
You gain access to all existing ZTP activation features through the web app, including the ability to view activation history for devices processed within the last seven days and monitor the status of firewalls during the provisioning process. The application maintains the same security and authentication requirements as the desktop ZTP portal while optimizing the user interface for smartphones.
This web app addresses deployment scenarios where installers work across multiple branch locations and may need to activate NGFWs for different customers without carrying laptops or requiring detailed technical documentation. The solution reduces the complexity of field deployments while maintaining the security and configuration management oversight that network security teams require for firewall provisioning workflows.