Prisma Access Browser
Prisma Access Browser Remote Connections
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
-
- Use the Prisma Access Browser Dashboards
- Digest Prisma Access Browser Home Screen Highlights
- Investigate Prisma Access Browser Events
- Account Protection for the Prisma Access Browser
- Manage Prisma Access Browser Users
- Manage Prisma Access Browser Applications
- Manage Prisma Access Browser Extensions
- Manage Prisma Access Browser Sign-in Rules
- Manage Prisma Access Browser Requests to Bypass Policy Rules
- Manage Rollback Control for the Prisma Access Browser
- Prisma Access Browser Remote Connections
- Location-based Policy
- The Prisma Access Browser Extension
-
- Integrate Prisma Access Browser with Microsoft 365
- Integrate Prisma Access Browser with Microsoft Information Protection
- Windows Account Based SSO Authentication
- Integrate Prisma Access Browser with Google Workspace
- Integrate Prisma Access Browser with Votiro
- Integrate Prisma Access Browser with CrowdStrike Falcon Intelligence
- Integrate Prisma Access Browser with OPSWAT MetaDefender
- Integrate Prisma Access Browser with YazamTech SelectorIT
- Integrate Prisma Access Browser with Symantec DLP
- IP Based Enforcement
- Certificate-Based Enforcement
- How Is Synched Data Stored?
Prisma Access Browser Remote Connections
How to use Remote connections and PRA
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Remote Connections in Prisma Access Browser enable secure, browser-based access to
RDP, SSH, or VNC sessions for both unmanaged and managed devices. This document
explains how to enable and configure Remote Connections, manage policies, and set up
user access.
Prerequisites
- Prisma Access (Managed by Panorama or Strata Cloud Manager)
- Prisma Access 5.2.1
- Minimum Prisma Access Dataplane Version: 11.2.4
- Prisma Access License with a Mobile User Subscription
- Privileged Remote Access (PRA) Add-On License
Remote Connection Overview
Enterprises often host critical infrastructure—including desktops, servers, and
databases—within private networks, restricting access to IT-managed devices via
RDP or SSH. However, employees and contractors may require secure access from
unmanaged or personal devices. Prisma Access Browser’s Remote Connections enable
controlled RDP, SSH, or VNC access directly from the browser, enforcing security
through Prisma Access Browser policies.
Key Benefits
- Browser-based access to remote hosts via RDP, SSH, or VNC.
- No need to distribute or expose host credentials (when needed).
- Seamless integration with Prisma Access for secure data transfer and traffic inspection.
- Granular policy controls (e.g., watermarks, clipboard, device posture checks).
Main Use Cases
- Credential-Protected Access: Organizations require a secure method for granting contractors access to specific remote hosts without exposing host credentials. Administrators must configure remote connections—whether credential-based or credential-free—and assign them to designated user groups while enforcing appropriate data controls and monitoring measures.
- BYOD for IT Teams: IT personnel often need to connect to various hosts from their personal devices. To accommodate this while maintaining security, administrators establish policies that allow designated user groups to access necessary destinations while ensuring compliance with security controls.
- Sensitive OT Machines: In critical environments, such as operational technology (OT) systems, administrators must enforce restricted access for contractors while continuously monitoring their activities. By configuring secure remote connections, enabling real-time session monitoring via Live Sessions, and retaining the ability to take control when necessary, organizations can ensure both security and operational integrity.
Configure Remote Connections
- Go to Configuration → Prisma Access Browser → Remote Connections.
- Click Enable.
- If you don’t have any Mobile Users (MU) already deployed, ensure you configure traffic flow properly in Prisma Access.
- Modify additional parameters as needed:
- Maximum Concurrent Sessions: Maximum number of remote connections a user can open simultaneously.
- Session Inactivity Timeout (minutes): Automatically ends a session after the specified idle period.
- Click Save.
After you first enable the Remote
connection, a new policy is added with a lower priority (above the baseline
rule) that blocks all users from using remote connections. Add new policy
rules to allow required user groups to access remote hosts.
Update Prisma Access Security Rules
Follow the instructions in the UI and add the relevant rules in Prisma
Access to allow traffic destined for your remote hosts.
If you are using Global Protect in full tunnel mode, please add both
rules.

Configure Applications for Privileged Remote Access
Add Remote Connections
Remote Connections let your users access Windows desktops (RDP),
servers (SSH), or other machines (VNC). You can optionally provide credentials
so users don’t need to know them.
- Go to Configuration → Prisma Access Browser → Applications → Remote Connections.
- Click Add Remote Connection.
- Enter basic information:
- Name and (optional) Description
- Destination FQDN/IP (must be reachable via your Service Connection/ZTNA)
- Protocol (RDP, SSH, or VNC)
- Port (if different from default)
- (Optional) Configure authentication:
- RDP: Provide User Name and Password, or leave both empty.
- SSH: Provide User Name and Password or use a Private Key (and Passphrase if encrypted). Optionally, provide a list of Host Key entries for server fingerprint verification.
- VNC: Optionally provide User Name and Password.
- (Optional) Enable File Transfer (for VNC) to allow SFTP-based file upload and download.
- Provide SFTP user credentials, SFTP port, or SFTP key details as appropriate.
- Click Save.
You can group multiple remote connections and other Saas/Private applications
into Application Groups to streamline policy enforcement and assignment
to user groups.


Policy Management
Configure remote connections policies just like you do for SaaS and
private applications.
- Go to Rules → Add a New Rule.
- In Destination, select Remote Connections.
- Define which remote connections to Allow or Block for a given scope:
- Admin-defined connections (specific or any).
- Manual connections (allowing end users to create their own connections).
- Any combination of the above.
How Does Policy Work for Remote Connections?
- URL Parsing vs. IP/Protocol: PAB enforces RDP/SSH/VNC connections based on extracted IP, port, and protocol, not the standard URL pattern used for SaaS apps.
- Rule Prioritization: Higher priority rules take precedence.
- Example
- Rule 1: Allow Remote Connection A, enable watermark, allow clipboard.
- Rule 2: Allow all manual connections but block clipboard.
- Outcome: Remote Connection A uses Rule 1’s settings
(clipboard allowed, watermark on). Manual connections not
covered by Rule 1 fall under Rule 2 (clipboard blocked).
Policy Limitations
- Unsupported Data Controls for remote sessions:
- Data masking
- Typing Guard
- Read-only mode
- Clipboard Controls: If policy blocks clipboard, users only see a blocking notice once at session start. No events are generated for each clipboard use attempt.
Manual Connections

Why use Manual Connections?
You might need flexible access to many hosts, or you may not want to configure
each server individually in Prisma Access Browser.
How this works?
- You grant Manual Connection permissions via policy.
- Users can create, edit, and delete their own connections.
- Users cannot share these connections; the link is user-specific.
- If the policy later revokes Manual Connection, all user-defined apps
become inaccessible. An admin sets a policy allowing certain user groups to create their own RDP/SSH/VNC connections without pre-registering them in the console.What if I need to restrict the access to a specific protocol or an IP range?You can create a rule in the PA Security Policy to allow the specific user group only a specific protocol (defined applications) or a defined IP range (in the Destination of the rule).
Visibility
- Event Page Display:
- The URL column displays IP:Port (Protocol) for remote sessions.
- Admin-Defined Connections: These appear with a clickable link to a defined application.
- User-Defined Connections: Displayed without a link to a defined application.
- Event Recording & Live Streaming:
- Remote sessions support event recording and real-time monitoring via Live Sessions.
Just-in-Time Control (User Requests)
- Requests Page: The URL column shows IP:Port (Protocol) for the requested connection.
- Approved Request: Grants access to the specific remote connection only.
- Manual Connection Behavior: If you select “Approval Required” for manual connections, the user must request approval for each new app they create .
Permissions
- Remote Connections Page
- Requires “Application” permission. If you can create applications, you can also create remote connections.
- Remote Connections Settings Page
- Same permissions as other settings.
- Policy, User Requests, and Visibility
- No additional special permissions beyond existing mechanisms.
End-Users
- Accessing Assigned Connections: Users can access their assigned remote connections from the Home Page or the Remote Connections page within the browser. Additionally, they have the option to bookmark any assigned or manually created connections for quick access.
- Logging In: If administrator-provided credentials are available, users are logged in automatically. Otherwise, they will be prompted to enter their credentials manually.
- Manual Connections: If permitted, users can create, edit, and delete their own remote connections. These manually created connections remain private and cannot be shared with other users.
If your organization doesn’t use the standard
Prisma Access Browser homepage, users can still access the portal from the
extension’s menu.



