Prisma Access
New Features in Prisma Access 6.1
Table of Contents
Expand All
|
Collapse All
Prisma Access Docs
-
- 6.1 Preferred and Innovation
- 6.0 Preferred and Innovation
- 5.2 Preferred and Innovation
- 5.1 Preferred and Innovation
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
-
-
- 4.0 & Later
- Prisma Access China
-
-
New Features in Prisma Access 6.1
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
This section provides you with a list of new features in Prisma Access 6.1
Preferred and Innovation, along with the recommended and required software versions you
need to use.
- Recommended Software Versions for Prisma Access 6.1 Preferred and Innovation
- Infrastructure, Plugin, and Dataplane Dependencies for Prisma Access 6.1 Preferred and Innovation Features
- Prisma Access 6.1 Features
Recommended Software Versions for Prisma Access 6.1 Preferred and Innovation
There are two Prisma Access 6.1 versions:
- 6.1 Preferred runs a PAN-OS PAN-OS 11.2.7-h5 (coming soon) dataplane.
- 6.1 Innovation runs on a PAN-OS 12.1.1 dataplane.
For Prisma Access 6.1 features, Palo Alto Networks recommends
that you upgrade your Prisma Access to the following versions
before installing the plugin.
| Prisma Access Version | Cloud Services Plugin Version | Required Dataplane Version for 6.1 | Recommended GlobalProtect Version | Recommended Panorama Version |
|---|---|---|---|---|
| 6.1 | 6.1 | 6.1 Preferred: Dependent on feature (PAN-OS 11.2.7-h5 (coming
soon) is the baseline version for 6.1 Preferred) 6.1
Innovation: PAN-OS 12.1.1 |
6.1.7+
6.1.3+
6.2.1+
Minimum required versions for IPv6 Support for Public Apps for
IP Optimization:
|
10.2.10+
11.0.1+
11.1.0
12.1.1
|
Infrastructure, Plugin, and Dataplane Dependencies for Prisma Access 6.1 Preferred and Innovation Features
Prisma Access6.1 features require one of more of the following components to
function:
- Infrastructure Upgrade—The infrastructure includes the underlying
service back-end, orchestration, and monitoring infrastructure. Prisma Access upgrades the infrastructure before the general
availability (GA) date of a Prisma Access release. Features that require only an infrastructure upgrade to be unlocked take effect for all Prisma Access deployments, regardless of version, at the time of the infrastructure upgrade.
- Plugin Upgrade (Prisma Access Panorama Managed Deployments
Only)—Installing the plugin activates the features that are
available with that release. You download and install the plugin on the
Panorama that manages Prisma Access.Prisma Access (Managed by Panorama) release 6.1 uses the Cloud Services Plugin 6.1.
- Dataplane Upgrade—The dataplane enables traffic inspection and
security policy enforcement on your network and user traffic.
- For Prisma Access (Managed by Strata Cloud Manager), go to ManageConfigurationNGFW and Prisma AccessOverviewPrisma Access Version.'
- For Prisma Access (Managed by Panorama) deployments, you can view your dataplane version by going to PanoramaCloud ServicesConfigurationService Setup and viewing the Prisma Access Version. Prisma Access 6.1 Preferred runs PAN-OS 11.2.7-h5 (coming soon) and Prisma Access 6.1 Innovation runs PAN-OS 12.1.1.
- For Prisma Access (Managed by Strata Cloud Manager), go to ManageConfigurationNGFW and Prisma AccessOverviewPrisma Access Version.'
A dataplane upgrade to 6.1 Innovation is optional, and is
only required if you want to take advantage of the features that require a dataplane
upgrade.
These features are activated with the infrastructure upgrade only for Prisma Access 6.1:
- None
These features require an infrastructure upgrade, a minimum Cloud Services
plugin version of 6.0, and a minimum dataplane of PAN-OS 11.2:
- Cloud-Delivered Security Services Support for Prisma Access
These features require an infrastructure and plugin upgrade and require a
minimum dataplane version of PAN-OS 11.2.7-h5 (coming soon), making them
Prisma Access 6.1 Preferred features:
- Response Page Customization and Context Passing
- SaaS Policy Rule Recommendations for NGFW and Prisma Access
- Server-Initiated Traffic Flow for Prisma Access ZTNA Connector
These features require an infrastructure, plugin, and dataplane upgrade to
PAN-OS 12.1.1, making them Prisma Access 6.1 Innovation features:
- CloudHSM Support for Prisma Access
- SASE Private Location
Prisma Access 6.1 Features
The following table describes the new features that will be generally available with
Prisma Access 6.1.
Cloud-Delivered Security Services Support for Prisma Access
|
Supported in:
Prisma Access 6.1 Preferred and Innovation
(minimum PAN-OS dataplane version of 11.2
required)
|
To maintain a robust defense against emerging threats, Prisma Access now includes
support for the following Cloud-Delivered Security Services (CDSS)
capabilities:
These features require a minimum Cloud Services plugin of 6.0 (for Prisma Access
(Managed by Panorama deployments only) and a minimum dataplane version of
PAN-OS® 11.2.
- Advanced DNS Security Powered by Precision
AI®—The Advanced DNS Security service defends against sophisticated
DNS-related threats to maintain network integrity and data security.
- DNS hijacking and misconfiguration prevention—Meticulously detects and immediately blocks DNS hijacking (where attackers alter DNS records to redirect traffic) and accidental or malicious DNS misconfigurations. This ensures the integrity of DNS resolution by preventing unauthorized redirection through advanced monitoring and analysis.
- Malicious traffic distribution system (TDS)—Combats threats hidden within malicious TDS—sophisticated attack frameworks that use complex DNS schemes to distribute malware and exploit kits. The service analyzes DNS traffic patterns to identify indicators of compromise (IOCs), effectively blocking access to these malicious distribution channels.
- Domain masquerading protection—Safeguards against domain masquerading by identifying and blocking malicious domains that closely resemble legitimate ones (typosquatting). It uses cutting-edge AI and machine learning algorithms to analyze vast amounts of DNS data, detecting subtle patterns and characteristic behaviors associated with spoofed or malicious domains.
- Advanced URL Filtering—Use
Prisma Access to add support for the following categories:
- Compromised website—This category specifically identifies legitimate websites that have been hacked or infected with malicious content. This allows you to use granular policy control to distinguish between inherently malicious sites and otherwise trustworthy sites that have been temporarily compromised.
- File converter—This categorizes sites that allow users to convert, compress, or modify files. This new category helps organizations manage access to these tools, mitigating data leakage and compliance risks associated with unauthorized file sharing and modification.
- ML-powered quishing (QR code) protection—Blocks quishing attacks by introducing an ML-powered QR code detector. This feature specifically addresses the growing threat of malicious QR codes embedded on legitimate websites, which attackers use to bypass the perimeter defenses of enterprise-protected networks and target unmanaged personal devices.
- Deepfake content detection—Protects against hyper-realistic social engineering. A new deep learning model is active to identify and block malicious content featuring deepfake videos. This provides essential protection from attackers who use highly convincing deepfake impersonations of trusted individuals in phishing attacks.
- Advanced WildFire® Powered by Precision
AI—Enhanced defenses against evasive threats including a new
deep learning model for PDF phishing, multi-CPU sandboxing for advanced malware,
and ML-powered API Vector Categorization for fileless attacks.
- PDF analysis for phishing—A new Convolutional Neural Network (CNN)-based deep learning model is available. This model analyzes the visual appearance (in addition to the text) of embedded URLs in PDF files to detect highly evasive, embedded phishing attacks that exploit the PDF format.
- API vector categorization—Leverages Machine Learning (ML) to perform in-memory analysis of the patterns and sequences of API calls made by malware during runtime. This advanced approach creates a unique behavioral "fingerprint" (API Vector) to accurately identify and classify highly evasive, fileless, and memory-resident attacks that bypass conventional analysis.
- Multi-CPU advanced dynamic analysis—Enhances Advanced Dynamic Analysis (sandboxing) by including multiple virtual CPUs (vCPUs) in the Windows guest sandbox environment. This capability is specifically designed to defeat sophisticated malware that evades detection by checking for and refusing to execute in single-CPU virtual environments.
- Advanced Threat Prevention Powered
by Precision AI—The following new features enhance threat detection,
custom threat coverage, and protection against advanced data exfiltration
attempts.
- Exfiltration shield for advanced threat prevention—Introduces a sophisticated machine learning (ML) model to combat advanced data exfiltration. This feature focuses on detecting stealthy data egress over common protocols like DNS relay and HTTP headers, which are frequently used to bypass traditional security. Integration is seamless with existing Advanced DNS Security and ATP subscriptions.
CloudHSM Support on Prisma Access
|
Supported in:
Prisma Access 6.1 Innovation
|
Do your security and compliance requirements prevent you from storing Transport Layer
Security (TLS) private keys directly on your Prisma® Access service infrastructure
for SSL decryption? This feature allows you to integrate with AWS CloudHSM or an on-premises hardware
security module (HSM) solution to store and manage the issuing Certificate Authority
(CA) private keys externally, enhancing the security of your cryptographic
operations. The SSL decryption functionality on Prisma Access mandates that you
bring your own public key infrastructure (PKI) to the platform or create a new
self-signed PKI within Prisma Access. This feature requires an issuing CA or forward
trust certificate (consisting of public and private keys) to generate new
certificates for visited sites and domains. Prisma Access requires that all
cryptographic secrets, including the TLS certificate private keys needed for SSL
decryption, are stored inside the configuration file that resides on the Prisma
Access service infrastructure and on each SPN that is part of the tenant. Some
Prisma Access customers prefer not to provide the TLS private keys on PA
infrastructure or reside on PA SPNs for SSL decryption operations (security and
compliance requirements).
FedRAMP Moderate Support
The Federal Risk and Authorization Management Program (FedRAMP) is a United States
government-wide program that provides a standardized approach to security
assessment, authorization, and continuous monitoring for cloud products and services
for government users. Prisma Access demonstrates FedRAMP Moderate compliance.
This release adds FedRAMP Moderate support for the following
features:
- Encrypted DNS. This feature is provided as a preview and is only available upon request. It enables Prisma Access to act as a DNS proxy, allowing Federal customers to meet CISA mandates by securely forwarding all external DNS traffic to CISA’s DNS service using DNS over HTTPs (DoH) or DNS over TLS (DoT) protocols, while maintaining split DNS for internal domains and providing the compliance logging required by OMB mandates.
- NGPA (IP Optimization). IP Optimization is a set of architectural enhancements that reduce the overall number of IP addresses in your deployment, simplifying your allow listing workflows while improving resiliency and enabling faster onboarding of Prisma Access tenants. It simplifies the management of IP addresses in a Mobile Users—GlobalProtect™ deployment. In deployments that don't use IP Optimization, you receive a single Mobile Users Security Processing Node (MU-SPN) for each Prisma Access location you allocate, and each node provides you with two egress IP addresses. Prisma Access uses the egress IP addresses to egress traffic to the internet, and you must also add these addresses to an allow list to give Prisma Access access to internet resources.
Granular Data Profiles
Granular data profiles enhance your Enterprise Data Loss Prevention (E-DLP) detection capabilities by allowing you to apply
differentiated inline content inspection requirements and response actions within
the same Security policy rule. For example, you can use a single granular data
profile to block high-risk data patterns while alerting on lower-risk ones, set
varying log severities for different data profiles, and set specific file types for
each data profile included in the granular data profile.
Granular data profiles simplify policy rulebase management by consolidating multiple
rules into a single, more flexible Security policy rule. Furthermore, they reduce
false positive detections and allow your data security admins to achieve a more
nuanced approach to data protection that aligns closely with your organization's
risk management strategy while maintaining a lean and efficient Security policy
rulebase.
Regional Cloud Mapping Updates for Advanced WildFire
|
For the Prisma Access 6.1 release, Prisma Access Compute
locations for Spain, Saudi Arabia, and Qatar, point to their
respective regional WildFire cloud locations for sample
processing.
|
Many organizations face strict data residency requirements that mandate the local
processing and storage of security data. For certain Advanced WildFire customers
using Prisma Access in select regions, using the local Advanced WildFire cloud for
file analysis, can lead to potential non-compliance issues with regional regulatory
policies, preventing these customers from adopting the service.
To help you meet these regulatory obligations and ensure optimal performance, Prisma Access now automatically selects the
nearest and most compliant WildFire® region based on the Prisma Access Compute
location. This critical enhancement ensures all customer data processing
and storage automatically adheres to regional requirements.
The selection process is fully automated in the back end, using a static mapping
between your deployment region and the closest WildFire service instance. This
capability removes the operational burden of manual regional configuration and
guarantees that you receive the best possible security analysis experience from a
regionally compliant service instance. The focus is placed entirely on the value
gained: seamless compliance and better performance through automatic
configuration.
Response Page Customization and Context Passing
|
Supported in:
Prisma Access 6.1 Preferred and Innovation
|
Organizations previously faced limitations with consistent branding because
current response pages provided restricted customization options, small buffer
sizes, and complex workflows. The customizable response pages feature addresses
these technical restrictions by expanding the response page buffer size to 45
KB and providing an intuitive upload interface for custom HTML templates.
You can create detailed response pages that include stylesheets, images, and
JavaScript, which allows you to maintain brand consistency while clearly
communicating information to your users.
When users encounter blocked content or need to acknowledge policies, the
response pages now pass specific context,
such as user identity, URL category, and rule details. This contextual information
helps users understand why access was blocked and provides administrators with
troubleshooting data when users open support tickets. You can configure
flexible match criteria based on source (IP addresses, hostname, users/groups) and
destination (IP addresses, URL hostnames, URL category), and apply specific response
pages for each scenario.
Enhancements to the Continue Pages feature enable you to set custom
timers for different categories of content. The system tracks user acknowledgment
within the platform and can report this information to external services. You can
also configure URL redirects to guide users to organizational login pages without
requiring custom JavaScript, making it simpler to implement corporate access
policies for SaaS applications.
These enhancements deliver an improved administrative experience and
create a more consistent and informative experience for end users. The solution
scales to support large user populations while maintaining performance across your
security infrastructure.
SASE Private Location
|
Supported in:
Prisma Access 6.1 Innovation
|
When regulatory compliance, data sovereignty, and geograpic location
prevent you from using external cloud infrastructure, SASE Private Location enables you to
deploy Prisma® Access services within your own infrastructure. This hybrid
deployment model addresses compliance, data sovereignty, and geographic location
requirements by keeping your network traffic and security processing within your
premises, eliminating the need to route data through external cloud infrastructure.
Using SASE private location, you can deploy agent-based Mobile Users in your data
center. You continue to manage configurations, policy rules, and monitoring through
the familiar Prisma Access UI.
Organizations in regulated industries, such as healthcare, financial
services, and government sectors, benefit from SASE Private Location. These
organizations often must comply with HIPAA regulations, data residency requirements,
or FedRAMP standards that prohibit sending traffic to external cloud services. You
can maintain the same Prisma Access security capabilities while ensuring that your
data never leaves your controlled environment. This approach is valuable when you
need low-latency access to critical applications or when your security policy rules
mandate that network security functions operate within your physical premises. Use
SASE Private Location when configuring your Prisma Access deployment to meet
stringent compliance requirements
The GlobalProtect® portal continues to operate from the cloud for global
accessibility, while the gateways run locally behind load balancers in your
environment, providing the optimal balance of centralized management and localized
performance.
SASE Private Location eliminates the traditional choice between cloud
managed security services and on-premises compliance requirements. You can achieve
regulatory compliance without sacrificing the operational benefits of cloud
management, automated updates, and centralized policy enforcement that characterize
modern SASE architectures. This capability becomes essential when your organization
requires air-gapped environments, operates in countries with strict data sovereignty
laws, or maintains corporate policies that restrict the use of external cloud
services for security functions.
Server-Initiated Traffic Flow for Prisma Access ZTNA Connector
Prisma® Access ZTNA Connector
server-initiated traffic flow allows applications running in your data center to
initiate connections to remote endpoints, solving a critical limitation where
connections previously could only flow from clients to servers. This feature enables
your data center servers to establish TCP, UDP, and ICMP connections to GlobalProtect® users, Remote Network hosts,
and IP subnet hosts in other ZTNA Connector data centers.
When you enable server-initiated traffic on a ZTNA Connector group, you
gain bidirectional communication capability without deploying separate Service
Connections, significantly reducing operational overhead. Your data center
applications can now proactively reach out to endpoints, which is essential for
remote troubleshooting, device management, patch distribution, and Voice Over
IP (VoIP) applications. For example, your IT helpdesk can use applications
like TeamViewer or LogMeIn to remotely access and troubleshoot user devices,
inventory management systems can scan and update remote endpoints, and VoIP servers
can initiate calls to users on managed devices.
The server-initiated feature integrates with your existing network
architecture through either static or dynamic routing. With dynamic BGP routing,
your data center routers automatically learn routes to permitted destinations,
simplifying network management. For security, you control which destinations your
servers can initiate connections to by selecting specific mobile user pools, remote
network prefixes, and ZTNA Connector IP subnet targets.
When server-initiated traffic is enabled, all outbound flows are
source-NATed with the ZTNA Connector’s IPsec tunnel interface IP, ensuring
consistent routing regardless of overlapping data center IP spaces. This approach
maintains compatibility with existing security policies while allowing you to
enforce more granular security through your data center firewall or at the
destination endpoints. The server-initiated traffic feature works seamlessly with
Dynamic DNS Updates, allowing data center applications to resolve connected
GlobalProtect users.
Tenant Control for Google Workspace Applications
Organizations face a critical data protection challenge in needing to permit access
to sanctioned corporate SaaS apps while blocking personal or unsanctioned instances
of the same app. To address this, we introduced a CASB/DLP enhancement, Tenant
Control for Google Workspace Applications. This session-tracking capability allows
the system to identify the specific Google tenant (such as corporate
your.company.com vs. personal gmail.com) a user is accessing. This enables
administrators to create granular policies that permit sanctioned Google Workspace
access while blocking or controlling personal accounts, directly preventing data
exfiltration. This feature requires an active SaaS Inline license. See SaaS policy rule recommendationsto help
you understand which Google Workspace applications are included in this feature and
how to enable this capability.