Define Prisma Cloud Enterprise and Anomaly Settings
Table of Contents
Prisma Cloud Enterprise Edition
Expand all | Collapse all
-
- Prisma Cloud
- Prisma Cloud License Types
- Prisma Cloud—How it Works
- Get Prisma Cloud From the AWS Marketplace
- Get Prisma Cloud From the GCP Marketplace
- Access Prisma Cloud
- Prisma Cloud—First Look
- Prisma Cloud—Next Steps
- Enable Access to the Prisma Cloud Console
- Access the Prisma Cloud REST API
- Prisma Cloud FAQs
-
- Cloud Account Onboarding
-
- Onboard Your AWS Organization
- Onboard Your AWS Account
- Configure Audit Logs
- Configure Flow Logs
- Configure Data Security
- Configure DNS Logs
- Configure Findings
- Update an Onboarded AWS Organization
- Add AWS Member Accounts on Prisma Cloud
- Update an Onboarded AWS Account
- Update an Onboarded AWS Account to AWS Organization
- AWS APIs Ingested by Prisma Cloud
- Troubleshoot AWS Onboarding Errors
- Prisma Cloud on AWS China
- Manually Set Up Prisma Cloud Role for AWS Accounts
- Automate AWS Cloud Accounts Onboarding
-
- Connect your Azure Account
- Connect your Azure Tenant
- Connect an Azure Subscription
- Connect an Azure Active Directory Tenant
- Authorize Prisma Cloud to access Azure APIs
- Update Azure Application Permissions
- View and Edit a Connected Azure Account
- Troubleshoot Azure Account Onboarding
- Microsoft Azure API Ingestions and Required Permissions
-
- Prerequisites to Onboard GCP Organizations and Projects
- Onboard Your GCP Organization
- Onboard Your GCP Projects
- Flow Logs Compression on GCP
- Enable Flow Logs for GCP Organization
- Enable Flow Logs for GCP Project
- Update an Onboarded GCP Account
- Create a Service Account With a Custom Role
- GCP API Ingestions
- Cloud Service Provider Regions on Prisma Cloud
-
- Prisma Cloud Administrator Roles
- Create and Manage Account Groups on Prisma Cloud
- Create Prisma Cloud Roles
- Create Custom Prisma Cloud Roles
- Prisma Cloud Administrator Permissions
- Manage Roles in Prisma Cloud
- Add Administrative Users On Prisma Cloud
- Add Service Accounts On Prisma Cloud
- Create and Manage Access Keys
- Manage your Prisma Cloud Profile
-
- Get Started
- Set up ADFS SSO on Prisma Cloud
- Set up Azure AD SSO on Prisma Cloud
- Set up Google SSO on Prisma Cloud
- Set up Just-in-Time Provisioning on Google
- Set up Okta SSO on Prisma Cloud
- Set up Just-in-Time Provisioning on Okta
- Set up OneLogin SSO on Prisma Cloud
- Set up Just-in-Time Provisioning on OneLogin
- View and Forward Audit Logs
- Define Prisma Cloud Enterprise and Anomaly Settings
- Add a Resource List on Prisma Cloud
- Adoption Advisor
-
- Prisma Cloud Alerts and Notifications
- Trusted IP Addresses on Prisma Cloud
- Enable Prisma Cloud Alerts
- Create an Alert Rule for Run-Time Checks
- Configure Prisma Cloud to Automatically Remediate Alerts
- Send Prisma Cloud Alert Notifications to Third-Party Tools
- View and Respond to Prisma Cloud Alerts
- Suppress Alerts for Prisma Cloud Anomaly Policies
- Generate Reports on Prisma Cloud Alerts
- Alert Payload
- Prisma Cloud Alert Resolution Reasons
- Alert Notifications on State Change
- Create Views
-
- Prisma Cloud Integrations
- Integrate Prisma Cloud with Amazon GuardDuty
- Integrate Prisma Cloud with Amazon Inspector
- Integrate Prisma Cloud with Amazon S3
- Integrate Prisma Cloud with AWS Security Hub
- Integrate Prisma Cloud with Amazon SQS
- Integrate Prisma Cloud with Azure Service Bus Queue
- Integrate Prisma Cloud with Cortex XSOAR
- Integrate Prisma Cloud with Google Cloud Security Command Center (SCC)
- Integrate Prisma Cloud with Jira
- Integrate Prisma Cloud with Microsoft Teams
- Integrate Prisma Cloud with PagerDuty
- Integrate Prisma Cloud with Qualys
- Integrate Prisma Cloud with ServiceNow
- Integrate Prisma Cloud with Slack
- Integrate Prisma Cloud with Splunk
- Integrate Prisma Cloud with Tenable
- Integrate Prisma Cloud with Webhooks
- Prisma Cloud Integrations—Supported Capabilities
-
- What is Prisma Cloud IAM Security?
- Enable IAM Security
- Investigate IAM Incidents on Prisma Cloud
- Cloud Identity Inventory
- Create an IAM Policy
- Integrate Prisma Cloud with IdP Services
- Integrate Prisma Cloud with Okta
- Integrate Prisma Cloud with AWS IAM Identity Center
- Remediate Alerts for IAM Security
- Context Used to Calculate Effective Permissions
Define Prisma Cloud Enterprise and Anomaly Settings
Set the enterprise level settings to set up the browser timeout when inactive, user attribution for alerts, and build training models for anomalies and define thresholds for alerts.
Set the enterprise level settings to build standard training models for anomaly detection, alert disposition, and some other global settings such as the timeout before the user is locked out for inactivity, and user attribution for alerts.
Set Up Inactivity Timeout
Specify a timeout period after which an inactive administrative user will be automatically logged out of Prisma Cloud. An inactive user is one who does not interact with the UI using their keyboard and mouse within the specified time period.
- Select.SettingsEnterprise Settings
- User Idle TimeoutIf you modify the timeout period, the new value is in effect for all administrative users who log in after you make the change; the previous timeout applies for all currently logged in users.
Set Up Global Settings for Policy and Alerts
These settings apply to all Prisma Cloud policies. The
Critical
severity policies are enabled out-of-the-box. For Anomaly policies, you have more customizable settings, see Set Up Anomaly Policy Thresholds.- Auto enable new default policies of the type.
- Select.SettingsEnterprise Settings
- Granularly enable newDefaultpolicies of severityCritical,High,Medium,LoworInformational.
While some high severity policies are enabled to provide the best security outcomes, by default, policies of medium or low severity are in a disabled state. When you select the checkbox to auto enable policies of a specific severity, you can either retroactively enable all policies that match the severity or only enable policies that are added to Prisma Cloud going forward.

If you enable policies of a specific severity, when you then clear the checkbox, the policies that were enabled previously are not disabled; going forward, policies that match the severity you cleared are no longer automatically enabled to scan your cloud resources and generate alerts. If you want to disable the policies that are currently active, you must disable the status of each policy on the
Policies
page.
- EnableMake Alert Dismissal Note Mandatory, to mandate the users to dismiss alerts only after specifying a reason.
- EnablePopulate User Attribution in Alerts Notifications.User attribution data provides you with context on who created or modified the resource that triggered the alert. Select this option to make sure that the alerts include user attribution data in the alert payload, so that it is sent as part of the JSON data to notification channels such as SQS or Splunk. Enabling this option can result in a delay of up to two hours in the generation of alerts because the relevant user information may not be instantly available from the cloud provider.The policies that support user attribution in alert payload are:
- AWS Security Group allows all traffic on RDP port (3389)
- AWS EBS snapshots are accessible to public
- AWS RDS snapshots are accessible to public
- AWS RDS instance is not encrypted
- AWS Security Group allows all traffic on SSH port (22)
- AWS Security Group overly permissive to all traffic
- AWS Amazon Machine Image (AMI) is publicly accessible
Enable Alarms
Prisma Cloud generates health notifications called
Alarms
that notify you about system-level issues and errors. After you enable Alarms, Prisma Cloud automatically generates alarms related to external Integrations status and onboarded Cloud Accounts status. You can configure rules to receive email notifications for the generated alarms so that you do not need access to the Prisma Cloud console to know when an error or issue occurs.- Select.SettingsEnterprise SettingsYou must have the System Administrator role on Prisma Cloud to view, enable, and disable Alarms.
- EnableAlarms Configuration.Later if you disable Alarms Configuration, all the alarms that were generated previously are deleted.
- Save.
Set up Access Key Settings
Prisma Cloud allows you to create and manage API keys to facilitate programmatic access to our features and functionality. Use the
Access Key Maximum Validity
settings to establish the platform limit for the maximum number of days for access key validity.Select a value in the
Maximum time before access keys expire
drop-down to complete set up.
To ensure uninterrupted access to Prisma Cloud APIs, you can also set up the following
Access Key Expiration Notifications
:- Email notifications for named user Access Keys
- Alarm Center notifications for Service Account Access Keys
Select a value under
Access Key Expiration Notifications > Notification Threshold
to set a notification threshold prior to access key expiration.Updates to
Access Key Expiration Notifications
settings may take up to 24 hours to take effect.Enable Audit Log Forwarding
Prisma Cloud generates Audit logs to help prepare your organization for regular audits. All actions, with some exceptions, initiated by Prisma Cloud administrators are captured in the Audit logs. This data can be forwarded to any previously configured supported notification channel or external integration of your choice. See View and Forward Audit Logs.
Unsubscribe from Prisma Cloud Chronicles
Prisma Cloud Chronicles is the weekly email update that summarizes your team’s Prisma Cloud usage, informs you of release updates, and provides recommendation on how you can improve your security posture with adopting Prisma Cloud.
If you have more than one Prisma Cloud tenant and want to unsubscribe all your administrators from receiving the newsletter you can disable globally.
- Select.SettingsEnterprise Settings
- SelectOpt out of receiving the Prisma Cloud Chronicles newsletter for all Prisma Cloud System Administrators.An email is sent to all administrators notifying them that a System Administrator has opted them out. Each administrator can edit their profile settings on Prisma Cloud to opt in and receive the newsletter, if they want to stay informed of the latest updates.
Set Up Anomaly Policy Thresholds
Prisma Cloud allows you to define different thresholds for anomaly detection for Unusual Entity Behavior Analysis (UEBA) that correspond to policies which analyze audit events, for unusual network activity that correspond to policies which analyze network flow logs, for DNS analytics, and for identity. You can also define your preference for when you want to alert notifications based on the severity assigned to the anomaly policy.
If you want to exclude one or more IP addresses or a CIDR block from generating alerts against Anomaly policies, see Trusted IP Addresses on Prisma Cloud.
- For UEBA policies:
- Select.SettingsAnomaly SettingsAlerts and Thresholds
- Select a policy.
- Define theTraining Model Threshold.The Training Model Threshold informs Prisma Cloud on the values to use for setting the baseline for the machine learning (ML) models.For production environments, set theTraining Model ThresholdtoHighso that you allow for more time and have more data to analyze for determining the baseline.For account hijacking attempts:
- Low: The behavioral models are based on observing at least 10 events over 7 days.
- Medium: The behavioral models are based on observing at least 25 events over 15 days.
- High: The behavioral models are based on observing at least 50 events over 30 days.For anomalous compute provisioning activity:None.For unusual user activity:
- Low: The behavioral models are based on observing at least 25 events over 7 days.
- Medium: The behavioral models are based on observing at least 100 events over 30 days.
- High: The behavioral models are based on observing at least 300 events over 90 days.
- Define yourAlert Disposition.Alert Disposition is your preference on when you want to be notified of an alert, based on the severity of the issue —low, medium, high. The alert severity is based on the severity associated with the policy that triggers an alert.You can profile every activity by location or user activity. The activity-based anomalies identify any activities which have not been consistently performed in the past. The location based anomalies identify locations from which activities have not been performed in the past.Choose the disposition (in some cases you may only have two to choose from):
- Conservative:For unusual user activity—Reports on unknown location and service to classify an anomaly.For account hijacking—Reports on location and activity to login under travel conditions that are not possible, such as logging in from India and US within 8 hours.For anomalous compute provisioning activity—Reports on high severity alerts only when an unusual number of instances are created within a short time interval, impossible time travel, and belonging to a TOR anonymity network.
- Moderate:For unusual user activity—Report on unknown location, or both unknown location and service to classify an anomaly.For anomalous compute provisioning activity—Reports on medium and higher severity alerts.
- Aggressive:For unusual user activity—Reports on either unknown location or service, or both to classify an anomaly.For account hijacking—Reports on unknown browser and Operating System, impossible time travel, or both.For anomalous compute provisioning activity—Reports on low and higher severity alerts.Set theAlert DispositiontoConservativeto reduce false positives.When a Prisma Cloud administrator modifies theAlert DispositionorTraining Model Thresholdsfor detecting anomalies that relate to UEBA, existing alerts associated with UEBA policies will no longer be resolved, but instead, remain as-is. Additionally, an audit log is generated to record who made the configuration change and when, to help you track and monitor changes.
- For unusual network activity.For anomalies policies that help you detect network incidents, such as unusual protocols or port used to access a server on your network, you can customize the following for each policy.
- Select.SettingsAnomaly SettingsAlerts and Thresholds
- Select a policy.
- Define theTraining Model Threshold.The Training Model Threshold informs Prisma Cloud on the values to use for various parameters such as number of days and packets for creating the ML models. These thresholds are available only for the policies that require model building such as Unusual server port activity and Spambot activity.
- Low: The behavioral models are based on observing at least 10K packets over 7 days.
- Medium: The behavioral models are based on observing at least 100k packets over 14 days.
- High: The behavioral models are based on observing at least 1M packets over 28 days.
- Define yourAlert Disposition.Alert Disposition is your preference on when you want to be notified of an alert, based on the severity of the issue —low, medium, high. The alert severity is based on the severity associated with the policy that triggers an alert. You can choose from three dispositions based on the number of ports, hosts or the volume of traffic generated to a port or host on a resource:
- Aggressive: Reports High, Medium, and Low severity alerts.For example, a Spambot policy that sees 250MB traffic to a resource, or a port sweep policy that scans 10 hosts.
- Moderate: Reports High and Medium severity alerts.For example, a Spambot policy that sees 500MB traffic to a resource, or a port sweep policy that scans 25 hosts.
- Conservative: Reports on High severity alerts only.For example, a Spambot policy that sees 1GB traffic to a resource, or a port sweep policy that scans 40 hosts.
- For unusual usage of workload credentials.For anomalies policies that help you detect when a credential that has been assigned to a compute resource, such as an EC2 instance, is used from inside the cloud service provider.
- Select.SettingsAnomaly SettingsAlerts and ThresholdsIdentity
- Select a policy.
- Define yourAlert Disposition.Alert Disposition is your preference on when you want to be notified of an alert. For unusual usage of workload credentials policies, this only applies when the suspicious IPs are inside the cloud because the policy is more prone to false positives when the suspicious IPs are inside the cloud provider’s IP space. When the suspicious IPs are outside the cloud provider’s IP space, alerts are always generated irrespective of the alert disposition setting.
- Aggressive: Alerts are generated only when the suspicious IP is inside the cloud and it resides within or outside the monitored cloud accounts.
- Moderate: Alerts are generated only when the suspicious IP is inside the cloud and it is a private IPv4 or it is outside the monitored cloud accounts.
- Conservative: Alerts are generated only when the suspicious IP is inside the cloud but outside of the monitored cloud accounts.