New Features in September 2023
Focus
Focus
Strata Cloud Manager

New Features in September 2023

Table of Contents

New Features in September 2023

Here are the new features available in Strata Cloud Manager in September 2023.
Here are the latest new features introduced on Strata Cloud Manager. Features listed here include some feature highlights for the products supported with Strata Cloud Manager. For the full list of new features supported for a product you're using with Strata Cloud Manager, see the release notes for that product.

Prisma Access: Traffic Mirroring and PCAP Support

September 29, 2023
Supported on Strata Cloud Manager for:
Prisma® Access secures your traffic in real time based on traffic inspection, threat analysis, and security policies. While you can view Prisma Access logs to view security events, your organization might have a requirement to save packet capture (PCAP) files for forensic and analytical purposes, for example:
  • You need to examine your traffic using industry-specific or privately-developed monitoring and threat tools in your organization and those tools require PCAPs for additional content inspection, threat monitoring, and troubleshooting.
  • After an intrusion attempt or the detection of a new zero-day threat, you need to preserve and collect PCAPs for forensic analysis both before and after the attempt. After you analyze the PCAPs and determine the root cause of the intrusion event, you could then create a new policy or implement a new security posture.
  • Your organization needs to download and archive PCAPs for a specific period of time and retrieve as needed for legal or compliance requirements.
  • Your organization requires PCAPs for network-level troubleshooting (for example, your networking team requires data at a packet level to debug application performance or other network issues).
To accomplish these objectives, you can enable traffic replication which uses the Prisma Access cloud to replicate traffic and encrypt PCAP files using your organization's encryption certificates.

Prisma Access: New Local Zones

September 29, 2023
New local zones:
  • South America West (Lima)
  • Nigeria (Lagos)
  • New Zealand (Auckland)
Now supported on Strata Cloud Manager for:
Local zones place compute, storage, database, and other services close to large population and industry centers. These locations have their own compute locations.
Keep in mind the following guidelines when deploying local zones:
  • Local zone locations do not support IPv6.
  • Local zone locations do not use Palo Alto Networks registered IP addresses.
  • 1 Gbps support for remote networks is not supported.
  • Remote network and service connection node redundancy across availability zones is not available if you deploy them in the same local zone, as both nodes are provisioned in a single zone.
  • These local zones do not use Palo Alto Networks registered IPs. If you have problems accessing URLs, report the website issue using https://reportasite.gpcloudservice.com/ or reach out to Palo Alto Networks support.
  • Some SaaS applications might experience a higher latency in local zones when compared with non-local zone locations.

Prisma Access: Microsoft Defender for Cloud Apps Integration

September 29, 2023
Supported on Strata Cloud Manager for:
Unmanaged cloud services and shadow IT applications can introduce significant security risks to your network. To address this issue, you can now integrate Prisma® Access with Microsoft Defender for Cloud Apps. This integration automatically syncs and blocks the list of unsanctioned applications inline, providing crucial closed-loop remediation. This integration enables you to gain visibility and to discover all cloud applications and shadow IT applications being used. The automated syncing and blocking provide crucial closed-loop remediation for unsanctioned applications.
Microsoft Defender is one of many Microsoft products that Prisma Access integrates with so that you can protect your applications and data on Azure, in Office 365, on the network, and the endpoint.

Cloud Management for NGFWs: New Predefined BGP Distribution Profile (Auto VPN & SD-WAN)

September 29, 2023
Supported on Strata Cloud Manager for:
Configuring full mesh connectivity and ensuring dynamic branch-to-branch communication in complex SD-WAN environments often requires manual intervention and intricate Border Gateway Protocol (BGP) setup. This process is time-consuming and can lead to configuration errors, potentially limiting the seamless flow of traffic across autonomous systems (AS).
Auto VPN simplifies network reachability management across your managed NGFW connections using SD-WAN. When you add NGFW to a VPN cluster, Strata Cloud Manager automatically assigns the predefined All-Connected-Routes BGP Redistribution profile by default. This BGP Redistribution profile determines network reachability based on IP prefixes available within autonomous systems (AS).
By setting the All-Connected-Routes profile as the default, you ensure SD-WAN broadcasts all connected routes to every VPN peer in the cluster. This profile handles both the necessary tunnel and route peering configuration, completing all route advertisements required for secure, dynamic branch-to-branch communication without administrative overhead. This automation immediately enables full network visibility, saving significant configuration time and ensuring a consistent routing policy across your entire VPN cluster.

Cloud Management for NGFWs: Custom Path Quality Profile (SD-WAN)

September 29, 2023
Supported on Strata Cloud Manager for:
Managing the performance of business-critical and latency-sensitive applications across multiple SD-WAN paths requires strict, real-time quality control. Network deterioration,even brief spikes in latency, jitter, or packet loss, can severely impact user experience and service continuity. Security administrators can now create custom path quality profiles for SD-WAN to define unique network quality requirements for applications, services, and groups.
Create a custom path quality profile on Strata Cloud Manager to establish maximum thresholds for key performance indicators: latency, jitter, and packet loss percentage. Security administrators specify the maximum limit for each parameter, above which the firewall considers the path unreliable. The firewall treats these criteria as OR conditions, meaning if the network quality exceeds any one of the defined thresholds (latency OR jitter OR packet loss), the firewall immediately selects the new best path. Any path that has latency, jitter, and packet loss metrics less than or equal to all three defined thresholds is considered qualified, and the firewall selects the final path based on the associated Traffic Distribution profile, ensuring consistent, high-quality network resources for your most demanding applications.

Cloud Management for NGFWs: Pre-Shared Keys Refresh (Auto VPN & SD-WAN)

September 29, 2023
Supported on Strata Cloud Manager for:
Auto VPN allows you to configure secure connectivity between Strata Cloud Manager and your managed firewalls using SD-WAN. Peers in the VPN cluster use a pre-shared key to mutually authenticate each other. Strata Cloud Manager now allows you to refresh the pre shared keys used for authenticating VPN tunnels for existing VPN clusters (ManageConfigurationNGFW and Prisma AccessGlobal SettingsAuto VPN).

Cloud Management for NGFWs: Cloud IP Tag Collection (with the Cloud Identity Engine)

September 29, 2023
Supported on Strata Cloud Manager for:
Enforcing your security policy consistently across all the firewalls in your network relies on those firewalls having the most up-to-date identity information from your sources, such as cloud-based identity management systems. With the array of management systems and large numbers of users and devices, it can often be time-consuming and difficult to correlate identity information with its originating sources and ensure that it was provided to all necessary devices.
You can now use Strata Cloud Manager with the Cloud Identity Engine to manage IP address-to-tag (also known as IP-tag) mappings and simplify your security policy by creating tag-based rules. When you configure a cloud connection in the Cloud Identity Engine to your cloud-based identity management system (either Azure or AWS), you can use the Cloud Identity Engine to collect IP-tag mappings.
You can see all of your IP-tag mappings, as well as their associated sources, in the Cloud Identity Manager. Using filters to highlight the most relevant information, you can quickly identify issues with your security policy, such as a source that is currently unavailable. You can then use the Strata Cloud Manager to create tag-based security policy using dynamic address groupsand distribute it to the firewalls in your network to ensure they have the latest information needed to consistently enforce security policy. You can also share the IP-tag mappings with other firewalls in your network by using User Context segments in the Cloud Identity Engine.
By leveraging the capabilities of Strata Cloud Manager with the identity information that the Cloud Identity Engine provides, you can more easily create and manage your security policy using tags.

Cloud Management for NGFWs: Configuration Version Snapshot

September 29, 2023
Supported on Strata Cloud Manager for:
Managing configuration pushes for cloud managed NGFWs and Prisma® Access deployments often lacks comprehensive oversight and rapid recovery options. Config Version Snapshots solve this by providing enhanced visibility and control over your security infrastructure changes, ensuring you can confidently deploy updates while maintaining the ability to quickly recover from any unintended consequences.
You can now evaluate configuration pushes with detailed analysis tools, compare your candidate configuration against previously pushed configurations to identify specific changes, and rollback recent modifications in the event of any unintended consequences from a recent push. This comparison functionality helps you understand exactly what will change before committing updates to production environments.
The system allows you to load previous configurations to use as candidates for your next configuration push, enabling you to build upon proven stable configurations and make incremental changes to expand the scope of the original setup. This iterative approach reduces risk by allowing you to test and validate changes incrementally rather than implementing large-scale modifications all at once.
When issues arise, you can restore previous configurations to immediately rollback the changes from a recent configuration push, minimizing downtime and quickly returning your security infrastructure to a known good state. This rollback capability is essential for maintaining business continuity during configuration troubleshooting scenarios.
Additionally, you can review the specific devices or deployments that are impacted or targeted by your configuration pushes, providing you with complete visibility into the full scope of changes across your entire security infrastructure. This comprehensive view ensures you understand which systems will be affected before executing any configuration updates.

Cloud Management for NGFWs: Troubleshooting for NGFW Connectivity and Policy Enforcement

September 29, 2023
Supported on Strata Cloud Manager for:
Troubleshoot these networking and identity features–track down and resolve connectivity issues or policy enforcement anomalies:
Network Troubleshooting for NAT and DNS Proxy
Troubleshoot your NGFWs from Strata Cloud Manager without having to move between various firewall interfaces. If you experience connectivity issues after deploying and configuring your NGFWs, you can get an aggregate view of your routing and tunnel states, and drill down to specifics to find anomalies and problematic configurations.
Identity and Policy Troubleshooting
Troubleshoot your identity-based policy rules and dynamically defined endpoints. Check the status of specific NGFWs and expose possible mismatches between how you expect a policy to work and its actual enforcement behavior.

Cloud Management for NGFWs: Config Cleanup

September 29, 2023
Supported on Strata Cloud Manager for:
Do dynamic business needs often require you to deal with rapid configuration changes that result in complex configurations with a number of zero hit rules, zero hit objects, unused objects, and duplicate objects? Such configurations can lead to a poor security posture and can inadvertently increase the attack surface of your network. Config Cleanup has you covered.
Config Cleanup gives you a comprehensive view of all policy rules that have no hits, objects that aren't referenced directly or indirectly in your configuration, objects that are referenced in a policy rule but have no hits in the Traffic log during the specified time frame, and objects of the same type with different names but have the same values so that you can better:
  • Manage attack surface exposure
  • Prioritize remediation actions
  • Remediate over time
  • Respond to audit questions when they arise
Identify and remove unused configuration objects and policy rules from your configuration. Removing unused configuration objects eases administration by removing clutter and preserving only the configuration objects that are required for security enforcement.
Review unused objects and policy rules across your entire Strata Cloud Manager configuration for the last 6 months, and optimize policy rules that are overly permissive rules to convert these to be more specific, focused rules that only allow the applications you’re actually using.
Together with Policy Optimizer, these tools help you ensure that your policy rules stay fresh and up to date.

Cloud Management for NGFWs: Policy Optimizer

September 29, 2023
Supported on Strata Cloud Manager for:
Overly permissive security rules—such as those allowing "any" application traffic—are common in large networks, creating security gaps by enabling unused applications and unnecessarily increasing the attack surface. Manual review and optimization of these broad rules require extensive log analysis and introduce deployment risk. Strata Cloud Manager introduces Policy Optimizer that analyzes log data to identify overly permissive security rules. Policy Optimizer auto-generates specific, focused rule recommendations based only on the applications actively observed on your network. This capability eliminates the need for manual log analysis, strengthens your security posture, and reduces administrative overhead. Administrators receive actionable, auto-generated optimization recommendations that can be reviewed and accepted through a guided workflow, ensuring that rule consolidation and replacement are secure and policy integrity is maintained. Together with Config Cleanup, these tools help you ensure that your policy rules stay fresh and up to date.

Cloud Management for NGFWs: Explicit Web Proxy

September 29, 2023
Supported on Strata Cloud Manager for:
Prisma® Access has its own, separate method of configuring explicit proxy. This new feature applies only to cloud-managed firewalls.
To consolidate management, you can now configure a web proxy on the firewalls you're managing with. This means that if you use an NGFW as a proxy device to secure your network, you can configure your proxy settings across your deployment from a single management interface.
This interface includes an in-app Proxy Auto-Configuration (PAC) file editor so that you can edit your proxy settings and modify your PAC file all in one place whenever network changes arise.
The web proxy supports two methods for routing traffic:
  • Explicit Proxy— The request contains the destination IP address of the configured proxy, and the client browser sends requests to the proxy directly. Authentication methods such as Kerberos and SAML 2.0 are supported, requiring the appropriate web proxy licensing.
  • Transparent Proxy—The request contains the destination IP address of the web server and the proxy transparently intercepts the client request (either by being in-line or by traffic steering). This method requires specific networking prerequisites, including a loopback interface, User-ID configuration in the proxy zone, and specific Destination NAT (DNAT) rules defined in Strata Cloud Manager. Transparent proxy does not support X-Authenticated Users (XAU) or Web Cache Communications Protocol (WCCP).
You can push web proxy configurations to the following platforms:
  • PA-1400
  • PA-3400
  • VM-Series (with a minimum of four vCPUs)

Strata Cloud Manager: SaaS Application Endpoint Lists and Enforcement

September 29, 2023
Supported on Strata Cloud Manager for:
SaaS providers publish lists of the IP addresses and URL endpoints their SaaS applications use, and frequently update these lists. Strata Cloud Manager now consumes application endpoint lists from the Palo Alto Networks EDL Hosting Service, so that you can easily enforce policy for SaaS providers including (but not limited to):
  • Microsoft
  • Azure
  • Amazon Web Services (AWS)
  • Google Cloud Platform (GCP)
  • Salesforce (SFDC) public endpoints
  • Microsoft Defender
  • Zoom
  • GitHub
In Strata Cloud Manager, you can now subscribe to SaaS application endpoints lists (both optional and required), and reference the lists in policies for your cloud-managed NGFWS and Prisma Access.
Important to know:
  • This feature natively integrates the Palo Alto Networks EDL Hosting Service with Strata Cloud Manager. If you are or were previously using the EDL Hosting Service, the introduction of this feature doesn't impact any of your existing configuration. Any EDLs you've already created that reference a feed URL will continue to work as expected.
  • Until now, the O365-Best-Practice snippet enabled you to directly subscribe to M365 endpoint lists in Strata Cloud Manager. With this feature, this snippet is now updated to be an application endpoint list. If you were using this snippet in a policy rule, the update is seamless, and the policy rule will reference the migrated application endpoint list.
  • SaaS Tenant Restrictions continue to provide you a way limit SaaS app usage to enterprise accounts (to stop users from accessing their personal accounts on the company network).
  • SaaS providers publish lists of the IP addresses and URL endpoints their SaaS applications use, and frequently update these lists. Strata Cloud Manager now hosts these SaaS application endpoint lists directly, so that you can enforce policy for application endpoints from SaaS providers including (but not limited to):

Strata Cloud Manager: Snippet Deletion

September 29, 2023
Supported on Strata Cloud Manager for:
Administrators often struggle with disorganized configuration scopes due to unused custom snippets cluttering their management interface. Over time, as network configurations evolve and deployments change, custom snippets can become obsolete or redundant, creating confusion during configuration management tasks and increasing the risk of accidentally applying outdated or inappropriate configurations to production environments.
You can now delete custom snippets that are no longer associated with any deployments, firewalls, or folders to keep your configuration scope organized and prevent unwanted or unused snippets from being applied by mistake. This cleanup capability helps maintain a streamlined configuration management experience and reduces the potential for configuration errors.
Snippets in Strata Cloud Manager are classified into two categories: Predefined snippets are available to all Strata Cloud Manager users and help you quickly get your new firewalls and deployments up and running with best practice configurations. Custom snippets are any snippets that administrators create for specific organizational needs.
You can delete unused custom snippets directly from the configuration scope view, providing a convenient way to maintain an organized snippet library. Note that predefined snippets available in Strata Cloud Manager cannot be deleted, ensuring that essential best practice configurations remain available to all users.

Strata Cloud Manager: Enhancements to WildFire Dashboard

September 27, 2023
Supported on Strata Cloud Manager for:
The Advanced WildFire dashboard is now enhanced to provide a comprehensive view of sample analysis data that you can use to make informed decisions. The dashboard displays the source of WildFire sample submissions, insights into unique and new samples by threat type, and context on the most recent submissions from your network. The dashboard also enables filtering of data based on a file hash.

Strata Cloud Manager: Advanced WildFire Analysis Data in IoC Search

September 15, 2023
Supported on Strata Cloud Manager for:
When evasive malware bypasses your defenses, it complicates post-breach analysis. You can now view Advanced Dynamic WildFire® analysis data directly within Threat Search in Strata Cloud Manager. This provides the in-depth detail required for a complete and thorough investigation. This feature integrates detailed results from Advanced WildFire—the cloud-based engine that detects and prevents highly evasive malware—directly into your search results.
This new data stream complements existing static and dynamic analysis, giving you a consolidated view of file behavior. As a result, you can simplify post-attack analysis, reduce investigation time, and accelerate threat hunting, all from a single screen.

Strata Cloud Manager: Signature-Based PCAP in Threat Logs

September 15, 2023
Supported on Strata Cloud Manager for:
You can now view and download signature-based packet captures (PCAPs), along with the inline detected PCAPs in threat logs. These packet captures provide context around a threat to help you report false-positives or learn more about the methods used by the attacker. To download a PCAP, view threat type logs in the Log Viewer and download packet captures.

Strata Cloud Manager: Log Viewer Visibility Enhancements

September 15, 2023
Supported on Strata Cloud Manager for:
Log Viewer is enhanced to search and view relevant logs easily. The enhancements include:
  • Autosuggestions for field values when you select a field in the query builder.
  • Search field names using substrings (for example, search with the string ‘user’ returns suggestions such as source_user, destination_user).
  • Search for a field based on the displayed field name in the log table and not just the actual field name in the log record. The query builder uses the displayed field name.
  • Press Shift + Enter to start a new line in the query builder, and press Enter to submit a query.