An organization's security policies and operational needs often require
administrators to enforce strict limits on how long users can remain logged into
remote sessions. To address this, you can now
configure the maximum session duration for
Privileged Remote Access to control how long users can remain logged in before being
automatically logged out. Previously, all sessions were terminated after a fixed
three-hour period regardless of your requirements. This feature allows you to set
the maximum session duration between 3 and 24 hours based on your security policies
and operational needs. When you configure a shorter duration, active sessions are
immediately affected, so you receive a confirmation prompt before applying changes
that might disrupt users. The Privileged Remote Access portal displays a countdown
warning 10 minutes before session termination. This hard timeout works independently
from the existing inactivity timeout, which terminates idle connections. You
configure maximum session duration at the Prisma® Access tenant level, and it
applies to all RDP, SSH, VNC connections for that Prisma Access deployment.