Manually Create a Configuration Profile for Prisma Access Agent
Learn how to create and deploy a configuration profile that defines how the Prisma Access Agent is configured and run on macOS devices.
Where Can I Use This?
What Do I Need?
Prisma Access (Managed by Strata Cloud Manager)
Prisma Access (Managed by Panorama)
NGFW (Managed by Panorama)
Check the prerequisites for the deployment you're
using
Prisma Access Agent version: 25.3.1.14
macOS 14 and later desktop devices
Contact your Palo Alto Networks account representative to
activate the Prisma Access Agent feature
Create and deploy a configuration profile for Prisma Access Agents that defines
how the Prisma Access Agent is configured on managed macOS devices. For
example, you can set up the configuration profile to automatically load system
extensions to provide a seamless experience for users running the Prisma Access Agent to access the internet, SaaS applications, and private
applications and resources in your organization.
This configuration profile will automatically load the following Prisma Access Agent extensions on a managed endpoint:
After you deploy the agent, you can run the systemextensionsctl
list command on an endpoint to verify that the extensions have been
loaded. For example:
Endpoint DLP Considerations
If you plan to use Endpoint DLP with Prisma Access Agent, complete the following steps:
Add the com.paloaltonetworks.pangdlp.enforcer
extension in the System Extensions payload.
If you previously deployed other Palo Alto Networks apps such as GlobalProtect™
and Cortex® XDR® to your endpoints, when deploying the system extensions via
mobile device management (MDM) software, the configuration profiles for Prisma Access Agent and the other Palo Alto Networks apps must include the
Allowed System Extension and Removable
System Extension settings. If only one of the profiles has the
removable system extension, the uninstallation of Prisma Access Agent
won’t complete.
Create a configuration profile for the Prisma Access Agent.
In Jamf Pro, select ComputersConfiguration ProfilesNew.
Specify General settings:
Name = Enter a display name for the
configuration profile
Level = Computer
Level
Configure a Content Filter payload to push the Prisma Access Agent content filter to your users' devices and suppress the
following prompts on the endpoints:
Select OptionsContent Filter.
Enter a Filter Name, such as PAA
Content Filter.
For the Identifier, enter
com.paloaltonetworks.pang.
identifier "com.paloaltonetworks.pang.networkextension" and anchor apple generic and certificate leaf[subject.OU] = PXPZ95SK77
Save your settings.
Create a Notifications payload to configure how Prisma Access Agent notifications are displayed on the end users'
devices.
If you saved your settings in the previous step, click
Edit.
Select OptionsNotificationsAdd.
Enter the App Name, such as Prisma
Access Agent.
For Bundle ID, enter
com.paloaltonetworks.PrismaAccessAgent.
Specify how you want alerts and notifications for the Prisma Access Agents to appear on the end users' devices. For
example, to configure notifications that are not overly intrusive,
select:
NotificationsEnable
Banner alert typePersistent
Save your settings.
Create a Privacy Preferences Policy Control payload to
configure access settings for the Prisma Access Agent. This will provide
Full Disk Access permissions for Prisma Access Agent processes.
If you saved your settings in the previous step, click
Edit.
identifier "com.paloaltonetworks.pang.securityextension" and anchor apple generic and certificate leaf[subject.OU] = PXPZ95SK77
APP OR SERVICE =
SystemPolicyAllFiles
ACCESS =
Allow
(Optional) To enable Endpoint DLP during the
installation of Prisma Access Agent, add two App
access sections to provide Full Disk Access permissions
for Endpoint DLP processes.
Click the + sign to add an App access
section for
com.paloaltonetworks.pangdlp.enforcer.
Specify the values as shown for the following fields:
identifier "com.paloaltonetworks.pangdlp.enforcer" and anchor apple generic and certificate leaf[subject.OU] = PXPZ95SK77
APP OR SERVICE =
SystemPolicyAllFiles
ACCESS =
Allow
Click the + sign to add an App
access section for
com.paloaltonetworks.pangdlp.
Specify the values as shown for the following fields:
Identifier =
com.paloaltonetworks.pangdlp
Identifier Type =
Bundle ID
Code Requirement =
identifier "com.paloaltonetworks.pangdlp" and anchor apple generic and certificate leaf[subject.OU] = PXPZ95SK77
APP OR SERVICE =
SystemPolicyAllFiles
ACCESS =
Allow
Save your settings.
Configure a System Extensions payload to automatically
load Prisma Access Agent system extensions on the end users' devices and
suppress notifications such as the following:
If you saved your settings in the previous step, click
Edit.
Select System ExtensionsConfigure.
Enter a Display Name such as PAA
Allowed System Extensions.
Specify the values as shown for the following fields:
For System Extension Types, select
Allowed system extensions.
For Team Identifier, enter
PXPZ95SK77.
In Allowed System Extensions, add the
following extensions:
Select Scope and Add the
Smart Computer Group that you created to target the specific managed
macOS devices for the installation of the Prisma Access Agent. You
can also select specific computers as deployment targets. For
example:
Save the scope of the profile. Jamf will target
the selected computers and computer groups for the distribution of the
configuration profile.
To verify the status of the configuration profile installation:
In Jamf Pro, select ComputersConfiguration Profiles.
Find the configuration profile that you set up and select
View.
Select the log that you want to view:
To show the configuration profiles that have been installed, select InventoryProfiles.
To show the status of the configuration profiles that are pending or
failed the push, select Management and view the
Pending Commands or Failed
Commands.
After the profile has been deployed, verify the status of the profile
installation on a macOS endpoint:
In System Settings, search for Profiles.
Double-click the Prisma Access Agent profile that you
deployed.
Review the profile settings to ensure that the correct settings have
been deployed.