Table of Contents
Expand all | Collapse all
-
- Getting started
- System Requirements
- Cluster Context
-
- Prisma Cloud Container Images
- Kubernetes
- Deploy the Prisma Cloud Console on Amazon ECS
- Console on Fargate
- Onebox
- Alibaba Cloud Container Service for Kubernetes (ACK)
- Azure Container Service (ACS) with Kubernetes
- Azure Kubernetes Service (AKS)
- Amazon Elastic Kubernetes Service (EKS)
- IBM Kubernetes Service (IKS)
- OpenShift v4
-
- Defender Types
- Manage your Defenders
- Redeploy Defenders
- Uninstall Defenders
-
- Deploy Orchestrator Defenders on Amazon ECS
- Automatically Install Container Defender in a Cluster
- Deploy Prisma Cloud Defender from the GCP Marketplace
- Deploy Defenders as DaemonSets
- VMware Tanzu Application Service (TAS) Defender
- Deploy Defender on Google Kubernetes Engine (GKE)
- Google Kubernetes Engine (GKE) Autopilot
- Deploy Defender on OpenShift v4
-
- Agentless Scanning Modes
-
- Onboard AWS Accounts for Agentless Scanning
- Onboard Azure Accounts for Agentless Scanning
- Configure Agentless Scanning for Azure
- Onboard GCP Accounts for Agentless Scanning
- Configure Agentless Scanning for GCP
- Onboard Oracle Cloud Infrastructure (OCI) Accounts for Agentless Scanning
- Configure Agentless Scanning for Oracle Cloud Infrastructure (OCI)
- Agentless Scanning Results
-
- Rule ordering and pattern matching
- Backup and Restore
- Custom feeds
- Configuring Prisma Cloud proxy settings
- Prisma Cloud Compute certificates
- Configure scanning
- User certificate validity period
- Enable HTTP access to Console
- Set different paths for Defender and Console (with DaemonSets)
- Authenticate to Console with Certificates
- Configure custom certs from a predefined directory
- Customize terminal output
- Collections
- Tags
- Logon settings
- Reconfigure Prisma Cloud
- Subject Alternative Names
- WildFire Settings
- Log Scrubbing
- Clustered-DB
- Permissions by feature
-
- Logging into Prisma Cloud
- Integrating with an IdP
- Integrate with Active Directory
- Integrate with OpenLDAP
- Integrate Prisma Cloud with Open ID Connect
- Integrate with Okta via SAML 2.0 federation
- Integrate Google G Suite via SAML 2.0 federation
- Integrate with Azure Active Directory via SAML 2.0 federation
- Integrate with PingFederate via SAML 2.0 federation
- Integrate with Windows Server 2016 & 2012r2 Active Directory Federation Services (ADFS) via SAML 2.0 federation
- Integrate Prisma Cloud with GitHub
- Integrate Prisma Cloud with OpenShift
- Non-default UPN suffixes
- Compute user roles
- Assign roles
-
- Prisma Cloud Vulnerability Feed
- Scanning Procedure
- Vulnerability Management Policies
- Vulnerability Scan Reports
- Scan Images for Custom Vulnerabilities
- Base images
- Vulnerability Explorer
- CVSS scoring
- CVE Viewer
-
- Configure Registry Scans
- Scan Images in Alibaba Cloud Container Registry
- Scan Images in Amazon Elastic Container Registry (ECR)
- Scan images in Azure Container Registry (ACR)
- Scan Images in Docker Registry v2 (including Docker Hub)
- Scan Images in GitLab Container Registry
- Scan images in Google Artifact Registry
- Scan Images in Google Container Registry (GCR)
- Scan Images in Harbor Registry
- Scan Images in IBM Cloud Container Registry
- Scan Images in JFrog Artifactory Docker Registry
- Scan Images in Sonatype Nexus Registry
- Scan images in OpenShift integrated Docker registry
- Scan Images in CoreOS Quay Registry
- Trigger Registry Scans with Webhooks
- Configure VM image scanning
- Configure code repository scanning
- Malware scanning
- Windows container image scanning
- Serverless Functions Scanning
- VMware Tanzu Blobstore Scanning
- Scan App-Embedded workloads
- Troubleshoot Vulnerability Detection
-
- Compliance Explorer
- Enforce compliance checks
- CIS Benchmarks
- Prisma Cloud Labs compliance checks
- Serverless functions compliance checks
- Windows compliance checks
- DISA STIG compliance checks
- Custom compliance checks
- Trusted images
- Host scanning
- VM image scanning
- App-Embedded scanning
- Detect secrets
- OSS license management
-
- Alert Mechanism
- AWS Security Hub
- Cortex XDR alerts
- Cortex XSOAR alerts
- Email alerts
- Google Cloud Pub/Sub
- Google Cloud Security Command Center
- IBM Cloud Security Advisor
- JIRA Alerts
- PagerDuty alerts
- ServiceNow alerts for Security Incident Response
- ServiceNow alerts for Vulnerability Response
- Slack Alerts
- Splunk Alerts
- Webhook alerts
- API
Radar
Radar is the primary interface for monitoring your environment.
Radar enables you to identify and block known and unknown traffic moving laterally through your environment.
Radar is the default view when you first log into the console.
Radar helps you visualize and navigate through all the data across Prisma Cloud.
For example, On the Radar canvas, you can visualize the connectivity between microservices, instantly drill into the per-layer vulnerability analysis tool, assess compliance, and investigate the incidents.

Radar makes it easy to conceptualize the architecture and connectivity of large environments, identify risks, and zoom in on incidents that require a response.
Radar provides a visual depiction of inter-network and intra-network connections between containers, apps, and cluster services across your environment.
It shows the ports associated with each connection, the direction of traffic flow, and internet accessibility.
When Cloud Native Network Segmentation (CNNS) is enabled, Prisma Cloud automatically generates the mesh shown in Radar based on what it has learned about your environment.
Radar’s pivot has a container view, a host view, and a serverless view.
In the container view, each image with running containers is depicted as a node in the graph.
In the host view, each host machine is depicted as a node in the graph.
As you select a node, an overlay shows vulnerability, compliance, and runtime issues.
The serverless view in Radar, visualize and inspect the attack surface of the serverless functions.
Radar refreshes its view every 24 hours.
The Refresh button has a red marker when new data is available to be displayed.
To get full visibility into your environment, install a Defender on every host in your environment.
Cloud Pivot
You can’t secure what you don’t know about.
Prisma Cloud discovery finds all cloud-native services deployed in AWS, Azure, and Google Cloud.
Cloud Radar helps you visualize what you’ve deployed across different cloud providers and accounts using a map interface.
The map tells you what services are running in which data centers, which services are protected by Prisma Cloud, and their security posture.
Select a marker on the map to see details about the services deployed in the account/region.
You can directly secure both the registries and the serverless functions by selecting
Defend
next to them.
You can filter the data based on an entity to narrow down your search.
For example, filters can narrow your view to just the serverless functions in your Azure development team accounts.
By default, there’s no data in Cloud Radar.
To populate Cloud Radar, configure cloud discovery scans.
Image pivot
Radar lays out nodes on the canvas to promote easy analysis of your containerized apps.
Interconnected nodes are laid out so network traffic flows from left to right.
Traffic sources are weighted to the left, while destinations are weighted to the right.
Single, unconnected nodes are arranged in rows at the bottom of the canvas.
Nodes are color-coded based on the highest severity vulnerability or compliance issue they contain, and reflect the currently defined vulnerability and compliance policies.
Manually rescan your environment if you edit an existing compliance/vulnerability policy to update the compliance/vulnerability issues in the radar view.
Color coding lets you quickly spot trouble areas in your deployment.
- Dark Red — High risk. One or more critical severity vulnerabilities detected.
- Red — High severity vulnerabilities detected.
- Orange — Medium vulnerabilities detected.
- Green — Denotes no vulnerabilities detected.

The numeral encased by the circle indicates the number of containers represented by the node.
For example, a single Kubernetes DNS node may represent five services.
The color of the circle specifies the state of the container’s runtime model.
A blue circle means the container’s model is still in learning mode.
A black circle means the container’s model is activated.
A globe symbol indicates that a container can access the Internet.
Connections between running containers are depicted as arrows in Radar.
Click on an arrow to get more information about the direction of the connection and the port.

The initial zoomed out view gives you a bird’s-eye view of your deployments.
Deployments are grouped by namespace.
A red pool around a namespace indicates an incident occurred in a resource associated with that namespace.

You can zoom-in to get details about each running container.
Select an individual pod to drill down into its vulnerability report, compliance report, runtime anomalies, and WAAS events.

Service account monitoring
Kubernetes has a rich RBAC model based on the notion of service and cluster roles.
This model is fundamental to the secure operation of the entire cluster because these roles control access to resources and services within namespaces and across the cluster.
While these service accounts can be manually inspected with kubectl, it’s difficult to visualize and understand their scope at scale.
Radar provides a discovery and monitoring tool for service accounts.
Every service account associated with a resource in a cluster can easily be inspected.
For each account, Prisma Cloud shows detailed metadata describing the resources it has access to and the level of access it has to each of them.
This visualization makes it easy for security staff to understand role configuration, assess the level of access provided to each service account, and mitigate risks associated with overly broad permissions.
Clicking on a node opens an overlay, and reveals the service accounts associated with the resource.

Clicking on the service accounts lists the service roles and cluster roles.

Service account monitoring is available for Kubernetes and OpenShift clusters.
When you install the Defender DaemonSet, enable the 'Monitor service accounts' option.
Istio monitoring
When Defender DaemonSets are deployed with Istio monitoring enabled, Prisma Cloud can discover the service mesh and show you the connections for each service.
Services integrated with Istio display the Istio logo.

Istio monitoring is available for Kubernetes and OpenShift clusters.
When you install the Defender DaemonSet, enable the 'Monitor Istio' option.
WAAS connectivity monitor
WAAS connectivity monitor monitors the connection between WAAS and the protected application.
WAAS connectivity monitor aggregates data on pages served by WAAS and the application responses.
In addition, it provides easy access to WAAS-related errors registered in the Defender logs (Defenders sends logs to the Console every hour).
a
WAAS monitoring is only available when you select an image or host protected by WAAS.

- Last updated- Most recent time when WAAS monitoring data was sent from the Defenders to the Console (Defender logs are sent to the Console on an hourly basis). By clicking on therefreshbutton users can initiate sending of newer data.
- Aggregation start time- Time when data aggregation began. By clicking on theresetbutton users can reset all counters.
- WAAS errors- To view recent errors related to a monitored image or host, click theView recent errorslink.
- WAAS statistics:
- Incoming requests - Count of HTTP requests inspected by WAAS since the start of aggregation.
- Forwarded requests - Count of HTTP requests forwarded by WAAS to the protected application.
- Interstitial pages served - Count of interstitial pages served by WAAS (interstitial pages are served once Prisma Sessions Cookies are enabled).
- reCAPTCHAs served - Count of reCAPTCHA challenges served by WAAS (when enabled as part of bot protection).
- Blocked requests - Count of HTTP requests blocked by WAAS since the start of aggregation.
- Inspection limit exceeded - Count of HTTP requests since the start of aggregation, in which the body content length exceeded the inspection limit set in the advanced settings.
- Parsing errors - Count of HTTP requests since the start of aggregation, where WAAS encountered an error when trying to parse the message body according to the Content-Type HTTP request header.
- Application statistics
- Count of server responses returned from the protected application to WAAS grouped by HTTP response code prefix
- Count of timeouts (a timeout is counted when a request is forwarded by WAAS to the protected application with no response received within the set timeout period).
Existing WAAS and application statistics counts will be lost once users reset the aggregation start time. will
not
affect WAAS errors and will not cause recent errors to be lost.For more details on WAAS deployment, monitoring and troubleshooting, refer to the WAAS deployment page.
Host pivot
The Radar view shows the hosts in your environment, how these hosts communicate with each other over the network, and their security posture.
Each node in the host pivot represents a host machine.
The mesh shows host-to-host communication.
The color of a node represents the most severe issue detected.
- Dark Red — High risk. One or more critical severity issues detected.
- Red — High severity issues detected.
- Orange — Medium issues detected.
- Green — No issues detected.
When you click on a node, an overlay shows a summary of all the information Prisma Cloud knows about the host.
Use the links to drill down into scan reports, audits, and other data.

Containers pivot
Radar segments your environment by cluster.
The main view lists all clusters in your environment. You can view information about each cluster such as its cloud provider, number of namespaces, and number of hosts in the cluster.
Clicking a card open the image pivot, which shows you all the namespaces and containers in the cluster.

Defenders report which resources belong to which cluster.
For managed clusters, Prisma Cloud automatically retrieves the name from the cloud provider.
As a fallback, Prisma Cloud can retrieve the name from your kubeconfig file.
Finally, you can manually specify the cluster name.
The cluster pivot is currently supported for Kubernetes, OpenShift, and ECS clusters only.
All other running containers in your environment are collected in the
Non-Cluster Containers
view.Radar Settings
You can enable network monitoring for containers and hosts.
- Log in to Prisma Cloud Console.
- SelectCompute > Radars > Settings.
- Enable CNNS for hosts and containers.EnableContainer network monitoringandHost network monitoring.
Add Network Objects
A network object is an entity or resource that your host or application interacts with and these can be internal or external entities including non-containerized services.
For example, a payment gateway might pass information to an external service to verify transactions.
- For hosts--You can configure network objects to enforce traffic destined from a host to a subnet or another host.
- For containers--You can configure network objects to enforce traffic destined from a container (referred to as an image) to a DNS, subnet, or to another container.
When a connection is established between two entities in your environment, CNNS policy evaluates the first rule where both source and destination match. If there are no matching rules, it allows the connection.
- Log in to Prisma Cloud Console.
- Create a network object.After you create a network object, Radar shows any connection established to the network object.
- SelectCompute > Radars > Settings > Add Network Object.
- Enter a Name.
- Select the Type.For containers (referred to as an image) and hosts, you must select the scope from a Collection. Some example network objects are:
- Type: Subnet; Value: 127.0.0.1/32
- Type: Subnet; Value: 151.101.0.0./16
- Type: DNS; Value: google.com
- Type: Host; Value: Name of the host from a collection you have already defined.
- Type: Image; Value: Name of the containerimage from a collection you have already defined.A subnet network object can reference a range of IP addresses or a single IP address in a CIDR format.If a rule alerts or prevents outgoing connections to a subnet, traffic will be blocked even if you have defined rules that allow some of those ports for containers/hosts that may be running on machines with IPs from the subnet.
View Connections on Radar
Radar helps you visualize the connections for a typical microservices app and view your microsegmentation policy, which is an aggregation of all your rules.

When a connection is observed, the dotted line becomes a solid line, and the CNNS policy is evaluated for a match.
If there is a matching rule, the color of the port number reflects the matching rule’s configured effect.
Yellow port numbers represent connections that raised an alert.
Orange port numbers represent connections that were blocked.
If there’s no matching rule, by default the connection is allowed.
The port number is in gray to indicate that the connection was observed, but there was no matching rule.
As a best practice, review the port numbers in gray to assess the need to add additional rules for enforcement.
If CNNS is disabled, you cannot view outgoing connections to external IP addresses.