Prisma Browser Self-Protection for Windows
Focus
Focus
Prisma Access Browser

Prisma Browser Self-Protection for Windows

Table of Contents

Prisma Browser Self-Protection for Windows

Self protection for windows
The Prisma Browser Self-Protection feature provides advanced runtime protection for Prisma Browser processes on Windows devices. It integrates a Windows kernel-mode driver that prevents interference from malicious software or unauthorized system changes.
The self-protection capability delivers kernel-level defense for Windows systems, protecting Prisma Access Browser’s runtime integrity.
This feature is available only on Windows 10 and later and is not supported on macOS
For macOS devices, System Integrity Protection (SIP) and existing posture controls continue to serve as the primary mechanisms for protecting the browser environment.
Supported Platforms
CategorySupportedNot Supported
Operating SystemWindows 10 and newer (physical or virtual machines)Windows versions before Windows 10
Architecturexx86 and x64ARM architecture
Installation TypeAdmin level installationUser level installation

Use Cases and Risk Profiles

The Self-Protection feature focuses on protecting Prisma Browser in high-risk environments, particularly where administrator privileges or unmanaged systems increase the attack surface.
Device TypeOS User RoleRisk ProfileDriver Requirement
Unmanageed devices (BYOD / ContractorsAdminHigh risk (insider threats, malware exposure) Driver required to enforce kernel-level integrity protection
Managed Corporate DevicesNon-AdminLow risk (centrally managed and policy-secured)Driver supported, but not critical

Installation Modes

Prisma Access Browser supports both user-level and admin-level installation modes.
The self-protection driver is only available in the admin-level installation.
Installation Types PermissionsDriver Component
User LevelUser permissionsDriver cannot be installed
Admin levelAdministrator permissionsDriver protection can be installed and activated
  • The driver is not installed by default.
  • The administrator must explicitly enable the self-protection policy before the driver is installed and activated.
  • After installation, Prisma Browser can run under a non-admin user account, and the protection driver will remain active under policy control.

Policy Configuration and Control

A new policy control named Browser self-protection is available under browser security policies.
This setting enables administrators to remotely control the activation state of the protection driver.
Policy characteristics:
  • Applies only to Windows systems where Prisma Browser is installed as admin.
  • Disabled by default
  • Managed centrally through enterprise policy distribution.

Enforcement for Inactive Protection

If Prisma Browser cannot start the protection driver (for example, when installed as a user or running on unsupported ARM hardware), the administrator can define an enforcement response using the Enforcement for Inactive Protection setting.
Enforcement OptionAdministrator ActionEnd-User Impact
Do not EnforceAllow browser to run anywayNo message appears
Prompt and Proceed anywayDisplay warning, and continue the browser sessionUser sees a warning dialog, but the browser runs normally
Block Browser AccessPrevent browser from startingBrowser shuts down and the user sees the warning dialog

End User Experience

When self-protection is properly installed and policy-enabled:
  • The protection driver runs silently with no performance impact.
  • The browser operates normally; no UI change or notification is shown.
  • The feature automatically activates at runtime under the active Prisma Access Browser policy.

Multi-Profile Sessions

Prisma Browser’s multi-profile policy ensures consistent protection across all profiles.
If any profile activates the protection driver during a session, the driver remains active and safeguards all profiles for the remainder of that session.

Device Reporting and Troubleshooting

Device and browser diagnostics display protection information to assist administrators in verifying the feature’s status.
Reported attributes include:
  • Browser installed as admin (Yes / No)
  • OS user is admin (Yes / No)
  • Device architecture
  • Browser self-protection status
StatusDescription
ProtectedPrisma Access Browser installed as Admin Policy enabled
Not ProtectedPolicy enabled, but driver failed to start
InactivePolicy not set or disabled
UnknownStatus undetermined (possible old Prisma Access Browser version)

Deployment Lifecycle

  • Driver upgrade: Managed seamlessly during standard Prisma Browser update flow.
  • Uninstallation: Removes driver and associated services automatically with Prisma Browser.
  • Reinstallation guidance: When reinstalling Prisma Browser to enable driver protection, users should not delete browsing data.

Compatibility and Limitations

The following configurations are unsupported or have limited protection:
LimitationDescription
User-Level InstallationDriver not installed; self-protection inactive
Windows ARM ArchitectureKernel driver not supported
Older Windows VersionDriver not compatible; feature unavailable.