Getting started
Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Getting started
Prisma Cloud software consists of two components: Console and Defender.
Install Prisma Cloud in two steps.
First, install Console.
Then install Defender.
Console is Prisma Cloud’s management interface.
It lets you define policy and monitor your environment.
Console is delivered as a container image.
Defender protects your environment according to the policies set in Console.
There are a number of Defender types, each designed to protect a specific resource type.
Install one Console per environment.
Here, environment is loosely defined because the scope differs from organization to organization.
Some will run a single instance of Console for their entire environment.
Others will run an instance of Console for each of their prod, staging, and dev environments.
Prisma Cloud supports virtually any topology.
The primary concern for most customers getting started with Prisma Cloud is securing their container environment.
To do this, install Container Defender on every host that runs containers.
Container orchestrators typically provide native capabilities for deploying an agent, such as Defender, to every node in the cluster.
Prisma Cloud leverages these capabilities to install Defender.
For example, Kubernetes and OpenShift, offer DaemonSets, which guarantee that an agent runs on every node in the cluster.
Prisma Cloud Defender, therefore, is deployed in Kubernetes and OpenShift clusters as a DaemonSet.
In this section, you’ll find dedicated install guides for all popular container platforms.
Each guide shows how to install Prisma Cloud for that given platform.
As you adopt other cloud-native technologies, Prisma Cloud can be extended to protect those environments too.
Deploy the Defender type best suited for the job.
For example, today you might use Amazon EKS (Kubernetes) clusters to run your apps.
This part of your environment would be protected by Container Defender.
Later you might adopt AWS Lambda functions.
This part of your environment would be secured by Serverless Defender.
Extending Prisma Cloud to protect other types of cloud-native technologies calls for deploying the right Defender type.

All Defenders, regardless of their type, report back to Console, letting you secure hybrid environments with a single tool.
The main criteria for installing Defender is that it can connect to Console.
Defender connects to Console via websocket to retrieve policies and send data.
In Compute Edition (self-hosted), the Defender websocket connects to Console on port 8084 (configurable at install-time).
The following diagram shows the key connections in Compute Edition.

Downloading the software
Prisma Cloud Compute Edition software can be downloaded from the Palo Alto Networks Customer Support portal.
For more information, see here.
Install guides
Start your install with one of our dedicated guides.
Install procedure | Description |
---|---|
Simple, quick install of Prisma Cloud on a single, stand-alone host.
Installs both Console and Defender onto a host.
Suitable for evaluating Prisma Cloud in a small, self-contained environment.
You can extend the environment by installing Defender on additonal hosts. | |
Prisma Cloud runs on any implementation of Kubernetes, whether you build the cluster from scratch or use a managed solution (also known as Kubernetes as a service).
We’ve tested and validated the install on: In some cases, there is a dedicated section for installing on a specific cloud provider’s managed solution.
When there is no dedicated section, use the generic install method. | |
Prisma Cloud offers native support for OpenShift. | |
To install Prisma Cloud, deploy Console to your cluster with a task definition.
Then configure the launch configuration for cluster members to download and run Defenders, guaranteeing that every node is protected. | |
Install Defender on Windows hosts running containers.
Defender is installed using a PowerShell script.
Note that while Defenders can run on both Windows and Linux hosts, Console can only run on Linux.
Windows Defenders are designed to interoperate with the Linux-based Console to send data and retrieve policy. |
Encryption
All network traffic is encrypted with TLS (https) for user to Console communication.
Likewise, all Defender to Console communication is encrypted with TLS (WSS).
The Prisma Cloud database is not encrypted at rest, however all credentials and otherwise secure information is encrypted with AES 256 bit encryption.
If you require data at rest to be encrypted, then underlying persistence storage /var/lib/twistlock can be mounted with one of the many options that support this.