Security Profile Support
Here are the security profiles available to you with Prisma Access Cloud Management. For each profile, best practice settings are built-in and turned on by default. You can use these settings as a basis to customize profiles, and build upon the features that each profile provides.
The resources here can give you an idea of the full feature set each profile offers, and how the profile features work. Keep in mind that the topics linked to here might show how the features are implemented on a PAN-OS next-gen firewall; while the workflows are different on Prisma Access Cloud Management (and often, they’re simpler), the concepts—”how it works”—remains the same.
Prisma Access Security Profiles
Anti-spyware is part of the Threat Prevention subscription. This type of protection zeros in on outbound threats, especially command-and-control (C2) activity, where an infected client is being leveraged as part of a remotely-conducted cyber attack.
Stop attacker attempts to exploit system flaws and gain unauthorized access to your network. Vulnerability protection is one part of the Threat Prevention subscription. This type of protection zeros in on inbound threats, where an attacker is attempting to exploit a system flaw to breach your network.
DNS Security is a continuously evolving threat prevention service designed to protect and defend your network from advanced threats using DNS. By leveraging advanced machine learning and predictive analytics, the service provides real-time DNS request analysis and rapidly produces and distributes DNS signatures that are specifically designed to defend against malware using DNS for C2 and data theft. Combined with an extensible cloud architecture, it provides access to a scalable threat intelligence system to keep your network protections up to date.
URL Access Control
URL Filtering (URL Access Control) gives you a way to control not only web access, but how users interact with online content. PAN-DB—the URL Filtering cloud— classifies sites based on content, features, and safety, and you can enforce your security policy based on these URL categories. You can also prevent credential phishing theft by tightly controlling the types of sites to which users can enter their corporate credentials.
WildFire and Antivirus
WildFire and Antivirus protects against malware concealed in files, executables, and email links.
Prisma Access Cloud Management forwards files, executables, and email links to WildFire™ cloud service for analysis, and also performs inline ML analysis for certain files. WildFire analyzes files and email links to detect threats and create protections to block malware. When WildFire identifies a zero-day threat, it globally distributes protection for that threat in under five minutes.
Prisma Access Cloud Management sends files to the WildFire cloud hosted in the United States, except for remote network and mobile user deployments located in the UK and Canada. In these two cases, Prisma Access Cloud Management automatically sends files to the WildFire United Kingdom and WildFire Canada clouds (respectively) to adhere to data sovereignty and residency laws and established data protection and privacy regulations.
Data Loss Prevention
Data loss prevention (DLP) protects sensitive information against unauthorized access, misuse, extraction, or sharing. DLP on Prisma Access enables you to enforce your organization’s data security standards and prevent the loss of sensitive data across mobile users and remote networks.
Important:If you’re already using Panorama to manage Enterprise DLP for next-gen firewalls, your DLP configuration in Prisma Access cloud management is read-only; continue to manage DLP from Panorama.
DLP is an add-on license on Prisma Access. You can either start with a 60-day trial or purchase a license to use Enterprise DLP on Prisma Access.
File Blocking Profiles allow you to identify specific file types that you want to want to block or monitor. For most traffic (including traffic on your internal network), block files that are known to carry threats or that have no real use case for upload/download.
HTTP Header Insertion
Use HTTP headers to manage SaaS application access; for example, allow access to an app’s enterprise account while disallowing consumer account access for the same app.
We’ve built in predefined settings that you can use to manage access to popular SaaS applications, like Google and YouTube. Or, create a custom rule to do HTTP header insertion for any other applications.
Recommended For You
Recommended videos not found.