Runtime defense for hosts
Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Runtime defense for hosts
Without secure hosts, you cannot have secure containers.
Host machines are a critical component in the container environment, and the hosts must also be secured like containers.
Prisma Cloud defender collects data about your hosts for monitoring and analysis.
Runtime host protection is designed to continuously report an up-to-date context for your hosts.
You can set detection for malware, network, log inspection, file integrity, activities, and custom events. Some detected events can only be alerted on, while others can be prevented.
Host runtime policy
By default, Prisma Cloud ships with an empty host runtime policy. An empty policy disables runtime defense entirely.
To enable runtime defense, create a new rule.
Prerequisites:
Install a host defender.- Go toDefend > Runtime > Host Policyand selectAdd rule.
- Enter aRule nameto indicate the target of each rule.
- TheScopeof each rule is determined by the collection assigned to that rule.Prisma Cloud uses rule order and pattern matching to determine which rule to apply for each workload.ThePreventaction for detection of file system events requires a Linux kernel version 4.20 or later.
Anti-malware
Anti-malware provides a set of capabilities that let you alert or prevent malware activity and exploit attempts.
Global settings
- Alert/prevent processes by path— Provides the ability to alert on or prevent execution of specific processes based on the processes name or the full path of binary from which the process is executed. Some of the common tools are available for easy addition by selecting their category.
- Allow processes by path— Provides the ability to mark processes as safe to use based on the process name or full path. Processes added to this list will not be alerted on or prevented by any of the Malware runtime capabilities.If a process is included in both the allow list and in the deny list, the process will still be allowed by the host runtime policy.
Anti-malware and exploit prevention settings
- Crypto miners— Apply specific techniques for detection of crypto miners, alert on file creation, and alert or prevent their execution.
- Non-packaged binaries created or run by service— Detect binaries created by a service without a package manager. Alert on file creation, and alert or prevent their execution.
- Non-packaged binaries created or run by user— Detect binaries created by a user without a package manager. Alert on file creation, and alert or prevent their execution.
- Processes running from temporary storage— Detect processes running from temporary storage (unexpected behavior for legitimate processes). Alert/prevent on file creation or execution.
- Webshell attacks— Detect abuse of web servers vulnerabilities to create a webshell. Alert on webshell creation and alert or prevent execution of linux command line tools from web servers.
- Reverse shell attacks— Detect usage of reverse shell and generate an alert.
- Execution flow hijack— Detect execution flow hijack attempt and generate an alert.
- Encrypted/packed binaries— Detect usage of encrypted/packed binaries and generate an alert. Such files are alerted on as encrypted and packed binaries may be used as a method to deploy malware undetected.
- Binaries with suspicious ELF headers— Detect suspicious binaries for ELF headers and generate an alert.
- Malware based on custom feeds— Generate alerts for files classified as malware by their MD5.
- Malware based on Prisma Cloud Advanced Threat Protection— Generate alerts for files classified as malware by Prisma Cloud advanced intelligence feed.
-
On operating systems where the defender supports identifying files of unknown origin (a file that wasn’t installed by a known OS package manager) and an intercepted filesystem operation was performed on a file of a known origin, the following host runtime protection rules are skipped:
- Writes of a crypto miner binary to disk
- Webshell attacks
- Execution flow hijacking
- Encrypted/packed binaries
- Binaries with suspicious ELF headers
- WildFire malware analysis
Advanced malware analysis
- Malware based on WildFire analysis— Use WildFire, the malware analysis engine of Palo Alto Networks, to detect malware and generate alerts. Currently Wildfire analysis is provided without additional costs, but this may change in future releases. To use Wildfire, enable it under Wildfire settings.
Host observations
- Track SSH events— As part of the host observation capability, you can completely track all the SSH activities on the host. This feature is enabled by default in new rules and you can choose to disable this feature under host observations.
Networking
Networking provides a high level of granularity in controlling network traffic based on IP, port, and DNS.
You can use your custom rules or use Prisma Cloud Advanced Threat Protection to alert on or prevent access to malicious sites.
IP connectivity
- Allowed IPs: — create an approved list of IPs which when accessed, will not generate an alert.
- Denied IPs and ports— Create a list of listening ports, outbound internet ports, and outbound IPs which when accessed will generate an alert.
- Suspicious IPs based on custom feed— Generate alerts based on entries added to the list of suspicious or high-risk IP endpoints underManage > System > Custom feeds > IP reputation lists
- Suspicious IPs based on Prisma Cloud advanced threat protection— Generate alerts based on the Prisma Cloud advanced threat protection intelligence stream.
DNS
When DNS monitoring is enabled, Prisma Cloud filters DNS lookups.
By default, DNS monitoring is disabled in new rules.
- Allowed domains— Create an approved list of domains which when accessed will not generate an alert or be prevented.
- Denied domains— Create a list of denied domains which when accessed will be alerted or prevented.
- Suspicious domains based on Prisma Cloud Advanced Threat Protection— Generate alerts or prevent access to domains based on Prisma Cloud Advanced Threat Protection Intelligence Stream.
Log inspection
Prisma Cloud lets you collect and analyze logs from operating systems and applications for security events.
For each inspection rule, specify the log file to parse and any number of inspection expressions.
Inspection expressions support the RE2 regular expression syntax.
Regardless of the specified inspection expression, log inspection has the following boundaries.
These boundaries are non-customizable.
File integrity management (FIM)
Changes to critical files can reduce your overall security posture, and they can be the first indicator of an attack in progress.
The Prisma Cloud FIM from Prisma Cloud continuously monitors your files and directories for changes.
You can configure FIM to detect:
- Read or write operations on sensitive files, such as certificates, secrets, and configuration files.
- Binaries written to the file system.
- Abnormally installed software. For example, FIM can detect files written to a file system by programs other than apt-get.
A monitoring profile consists of rules, where each rule specifies the path to monitor, the file operation, and the exceptions to the rule.

The file operations supported are:
- Writes to files or directories When you specify a directory, recursive monitoring is supported.
- Read When you specify a directory, recursive monitoring isn’t supported.
- Attribute changes The attributes watched are permissions, ownership, timestamps, and links. When you specify a directory, recursive monitoring isn’t supported.
Activities
Set up rules to audit host events.
Custom rules
For details on the custom rules policy refer to this section.
Monitoring
To view the data collected about each host, go to
Monitor > Runtime > Host observations
, and select a host from the list.Apps
The
Apps
tab lists the running programs on the host.
New apps are added to the list only on a network event.
For each app, Prisma Cloud records the following details:
- Running processes (limited to 15).
- Outgoing ports (limited to 5).
- Listening ports (limited to 5).
Prisma Cloud keeps a sample of spawned processes and network activity for each monitored app, specifically:
- Spawned process — Processes spawned by the app, including observation timestamps, username, process (and parent process) paths, and the executed command line (limited to 15 processes).
- Outgoing ports — Ports used by the app for outgoing network activity, including observation timestamps, the process that triggered the network activity, IP address, port, and country resolution for public IPs (limited to 5 ports).
- Listening ports — Ports used by the app for incoming network activity, including the listening process and observation timestamps (limited to 5 ports).
Proc events will add the proc only to existing apps in the profile. The defender will cache the runtime data, saving timestamps for each of the 15 processes' last spawn time.
Limitations:
- Maximum of 50 apps.
- Last 10 spawned processes for each app.
SSH session history
The
SSH events
tab shows ssh commands run in interactive sessions, limited to 100 events per hour.
Security updates
Prisma Cloud periodically checks for security updates.
It’s implemented as a compliance check.
This feature is supported only for Ubuntu/Debian distributions with the "apt-get" package installer.
Prisma Cloud probes for security updates every time the scanner runs (every 24 hours, by default).
The check is enabled by default in
Defend > Compliance > Hosts
in the Default - alert on critical and high
rule.
The
Security Updates
show the pending security updates (based on a new compliance check that was added for this purpose).
Supported for Ubuntu and Debian.On each host scan, Prisma Cloud checks for available package updates marked as security updates and lists such updates under
Security Updates
.Audits
You can view audits about host runtime events under
Monitor > Events > Host audits
.