Security Profile Support
Here are the security profiles available
to you with Prisma Access Cloud Management. For each profile, best
practice settings are built-in and turned on by default. You can
use these settings as a basis to customize profiles, and build upon
the features that each profile provides.
The resources here can give you an idea of the full feature set
each profile offers, and how the profile features work. Keep in
mind that the topics linked to here might show how the features
are implemented on a PAN-OS next-gen firewall; while the workflows
are different on Prisma Access Cloud Management (and often, they’re simpler),
the concepts—”how it works”—remains the same.
Prisma Access Security Profiles | |
---|---|
Anti-Spyware | Anti-spyware is part of the Threat Prevention
subscription. This type of protection zeros in on outbound threats,
especially command-and-control (C2) activity, where an infected
client is being leveraged as part of a remotely-conducted cyber
attack. |
Vulnerability Protection | Stop attacker attempts to exploit system flaws
and gain unauthorized access to your network. Vulnerability protection
is one part of the Threat Prevention subscription. This type of
protection zeros in on inbound threats, where an attacker is attempting
to exploit a system flaw to breach your network. |
DNS Security | DNS Security is a continuously evolving
threat prevention service designed to protect and defend your network
from advanced threats using DNS. By leveraging advanced machine
learning and predictive analytics, the service provides real-time
DNS request analysis and rapidly produces and distributes DNS signatures
that are specifically designed to defend against malware using DNS
for C2 and data theft. Combined with an extensible cloud architecture,
it provides access to a scalable threat intelligence system to keep
your network protections up to date. |
URL Access Control | URL Filtering (URL Access Control) gives
you a way to control not only web access, but how users interact
with online content. PAN-DB—the URL Filtering cloud— classifies
sites based on content, features, and safety, and you can enforce
your security policy based on these URL categories. You can also
prevent credential phishing theft by tightly controlling the types
of sites to which users can enter their corporate credentials. |
WildFire and Antivirus | WildFire and Antivirus protects against
malware concealed in files, executables, and email links. Prisma
Access Cloud Management forwards files, executables, and email links
to WildFire™ cloud service for analysis, and also performs inline
ML analysis for certain files. WildFire analyzes files and email
links to detect threats and create protections to block malware.
When WildFire identifies a zero-day threat, it globally distributes
protection for that threat in under five minutes. Prisma Access
Cloud Management sends files to the WildFire cloud hosted in the
United States, except for remote network and mobile user deployments
located in the UK and Canada. In these two cases, Prisma Access
Cloud Management automatically sends files to the WildFire United
Kingdom and WildFire Canada clouds (respectively) to adhere to data
sovereignty and residency laws and established data protection and
privacy regulations. |
Data Loss Prevention | Data loss prevention (DLP) protects sensitive
information against unauthorized access, misuse, extraction, or
sharing. DLP on Prisma Access enables you to enforce your organization’s
data security standards and prevent the loss of sensitive data across mobile
users and remote networks. Important: If you’re already
using Panorama to manage Enterprise DLP for next-gen firewalls,
your DLP configuration in Prisma Access cloud management is read-only; continue
to manage DLP from Panorama.DLP is an add-on license
on Prisma Access. You can either start with a 60-day trial or purchase
a license to use Enterprise DLP on Prisma Access. |
File Blocking | File Blocking Profiles allow you to identify
specific file types that you want to want to block or monitor. For
most traffic (including traffic on your internal network), block
files that are known to carry threats or that have no real use case
for upload/download. |
HTTP Header Insertion | Use HTTP headers to manage SaaS application
access; for example, allow access to an app’s enterprise account
while disallowing consumer account access for the same app. We’ve
built in predefined settings that you can use to manage access to
popular SaaS applications, like Google and YouTube. Or, create a
custom rule to do HTTP header insertion for any other applications. |
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.