New Features in November 2024
Focus
Focus
Strata Cloud Manager

New Features in November 2024

Table of Contents

New Features in November 2024

Here are the new features available in Strata Cloud Manager in November 2024.
Here are the latest new features introduced on Strata Cloud Manager. Features listed here include some feature highlights for the products supported with Strata Cloud Manager. For the full list of new features supported for a product you're using with Strata Cloud Manager, see the release notes for that product.

Autonomous Digital Experience Management (ADEM): Specific SD-WAN Path Monitoring

November 22, 2024
Supported for:
  • Prisma Access (Managed by Strata Cloud Manager)
  • Autonomous Digital Experience Management (ADEM)
  • Prisma SD-WAN
  • SD-WAN ION version 6.4.2 or later
  • ADEM agent 3.4.7 or later
Previously, your synthetic application tests in Autonomous DEM probed all possible network paths to an application. This often skewed your application experience scores with irrelevant data from unused paths, making it difficult and time-consuming to troubleshoot performance issues.
If you have configured Prisma SD-WAN path policy rules for your remote sites, you can now specify that your synthetic application tests probe a particular SD-WAN path. This allows you to test the exact path your user traffic actually follows, eliminating irrelevant data from your analysis.
Focusing on these active paths provides an application experience score that accurately reflects real-world user experience. This precision helps you resolve issues faster, make better-informed decisions to improve application performance, and significantly lower your mean time to resolution.

Strata Cloud Manager: Policy Optimizer Enhancements

November 18, 2024
Supported on Strata Cloud Manager for:
  • NGFW, including those funded by Software NGFW Credits (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Strata Cloud Manager)
Here are the Policy Optimizer enhancements:
  • Policy Optimizer considers rules created over 15 days ago for optimization.
  • After optimizing a security rule, the Policy Optimizer feature will not reselect it for optimization for the next 90 days.
  • Recommendations automatically appear in the results after optimization.
  • To optimize a rule that wasn't automatically selected by Strata Cloud Manager, add the predefined Enable-AIOps-Optimization tag to it.
  • Displays the reason for optimization failure.
  • Displays negated addresses in the recommendations.
Overly permissive security rules—such as those allowing "any" application traffic—are common in large networks, creating security gaps by enabling unused applications and unnecessarily increasing the attack surface. Manual review and optimization of these broad rules require extensive log analysis and introduce deployment risk. Strata Cloud Manager introduces Policy Optimizer that analyzes log data to identify overly permissive security rules. Policy Optimizer auto-generates specific, focused rule recommendations based only on the applications actively observed on your network. This capability eliminates the need for manual log analysis, strengthens your security posture, and reduces administrative overhead. Administrators receive actionable, auto-generated optimization recommendations that can be reviewed and accepted through a guided workflow, ensuring that rule consolidation and replacement are secure and policy integrity is maintained. Together with Config Cleanup, these tools help you ensure that your policy rules stay fresh and up to date.

Strata Cloud Manager: NGFW Support for Configuration APIs

November 15, 2024
Supported on Strata Cloud Manager for:
  • Prisma Access
  • NGFW (Managed by Strata Cloud Manager)
  • Cloud NGFW (Managed by Strata Cloud Manager)
The Strata Cloud Manager Configuration APIs now support both the Next Generation Firewall and Cloud Next Generation Firewall platforms. This is in addition to the already existing support for the Prisma Access (SASE) platform. To support the additional platforms, the API documentation on pan.dev has a new organization that includes a Strata Cloud Manager-specific landing page. The configuration API documentation has also been broken into functional areas and then organized by platform.
Other major changes include:
There are many other changes to the configuration APIs, both to support the new platforms, and to support new functionality. For complete details on this release, please see the Strata Cloud Manager API November 2024 Release Notes.

25,000 Remote Network and 50,000 IKE Gateway Support

November 15, 2024
Supported for:
  • Prisma Access (Managed by Strata Cloud Manager)
As enterprise networks expand, the ability to onboard and manage large-scale remote networks and IKE gateways becomes critical for maintaining performance and security. To accommodate the capacity increase for Prisma® Access deployments, the Strata Cloud Manager web interface now provides enhanced tools for navigating and managing large lists of remote networks and IKE gateways. These improvements, including advanced filtering, sorting, and grouping options, ensure administrators can quickly find, manage, and monitor remote networks, IPSec tunnels, and QoS settings, which significantly improves operational efficiency at scale.
The interface now provides pagination, allowing you to choose how many rows to display on a given page. A search ability is added, allowing you to find the desired remote network in the list by typing its Name in the text box. You can also group by compute locations. All groups display in a collapsed view and the page size you selected applies to the groups. When you select a compute location to expand it, the view displays based on the page size you selected.

DNS Proxy Customizations

October 15, 2024
Supported for:
  • Prisma Access (Managed by Strata Cloud Manager)
Organizations using Explicit Proxy often face challenges integrating their cloud security with specialized internal network infrastructure, particularly regarding custom Domain Name Service (DNS) resolution. This limitation can interrupt seamless access to both public internet applications and critical internal private resources. Explicit Proxy now expands its capabilities to include comprehensive DNS Proxy customization, solving this hybrid networking challenge. This feature allows you to seamlessly integrate regional DNS, custom third-party resolvers, or existing on-premises DNS infrastructure. By supporting FQDN-based resolution, the solution guarantees that all applications—whether public or privately hosted—are resolved correctly and securely. This optimization is supported on Panorama Managed Prisma ® Access, delivering a more robust and flexible security posture for hybrid environments and optimizing the user experience.

Named Configuration Snapshots

November 15, 2024
Supported for:
  • Prisma Access (Managed by Strata Cloud Manager)
  • NGFW (Managed by Strata Cloud Manager)
Save a configuration as a named snapshot in Strata Cloud Manager for enhanced configuration management and version control. Previously in Strata Cloud Manager, users were limited to loading only previously pushed configurations that had been committed to the firewalls. This restriction meant that administrators had to manually keep track of configuration pushes and timing if they wanted to maintain access to a known good configuration they could fall back on during troubleshooting or rollback scenarios.
Now, with the new Config Version Snapshot dashboard, you can save any in-progress configuration as a named snapshot, providing unprecedented flexibility in configuration management workflows. Having a named snapshot capability allows you to preserve specific configuration states that you can easily load to restore Strata Cloud Manager to a known working state, regardless of whether that configuration was ever pushed to production firewalls.
The named configuration snapshots feature includes a dedicated management interface with their own organized table view, where you can assign descriptive names to each snapshot for easy identification and tracking. This naming convention enables teams to maintain clear documentation of configuration milestones, test states, or backup points. For example, you might save snapshots labeled "Pre-Migration Baseline," "Security Policy Update v2.1," or "Known Good State - Q4 2024."
When you save a named snapshot, it replaces the current configuration candidate in your workspace, allowing you to immediately begin working from that restored state. This functionality is particularly valuable for testing configuration changes, maintaining configuration templates, or quickly reverting to stable configurations during incident response scenarios.

Session Browser for Strata Cloud Managed NGFWs

November 15, 2024
Supported for:
  • NGFW (Managed by Strata Cloud Manager)
To help troubleshoot your cloud managed NGFWs, a Session Browser is now available in Strata Cloud Manager. The session browser addresses common challenges faced by security teams who are unable to interface with their NGFWs directly due to various operational constraints, such as NGFWs not being physically on location, network connectivity issues, or security policies that restrict direct device access.
The Session Browser provides real-time visibility into network traffic and session data, enabling administrators to diagnose issues remotely without requiring physical presence at the NGFW location. When reviewing session information, you can leverage advanced filtering capabilities to quickly isolate relevant data by rules, sources, destinations, or App-ID™. This granular filtering allows for efficient troubleshooting by narrowing down sessions to specific applications, user groups, or network segments that may be experiencing issues.
Beyond the core session browsing functionality, this release consolidates previously scattered troubleshooting capabilities into a unified experience. The available troubleshooting tools for DNS Proxy, User IP mapping, User Group configurations, Routing tables, Dynamic User Group membership, Dynamic Address Group populations, NAT policy evaluation, and External Dynamic Lists are now accessible through a single dashboard. This consolidation significantly reduces the time spent navigating between different interfaces and provides a complete view of your NGFW's operational status.
This feature allows distributed security teams to maintain optimal NGFW performance and quickly resolve network issues regardless of their physical proximity to the infrastructure.

Exclude URLs and Apps From Enterprise DLP Inspection for Non-File Based Traffic

November 1, 2024
Supported for:
  • NGFW (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Strata Cloud Manager)
Managing a complex security policy rulebase and minimizing false positive data loss prevention incidents requires fine-grained control over network inspection settings. The Enterprise Data Loss Prevention (E-DLP) Exclude URLs and Apps for Non-File Based Traffic feature enables your data security administrators to precisely define traffic inspection exceptions within a DLP rule.
Your data security administrators can now easily exclude certain URLs and apps from having their non-file based traffic forwarded to Enterprise DLP for inspection. This exclusion capability is essential for several scenarios. For example, when you have traffic containing sensitive data destined for specific, trusted URLs and you want to exclude them from incident reporting, or when you only require file-based traffic inspection for specific apps but do not need inspection of accompanying non-file based data. This prevents unnecessary processing and avoids false positive detections.
By configuring these targeted exclusions using existing Security policy rules, you significantly ease the operational overhead of managing your policy rulebase, reducing the total number of policy rules required and improving overall system efficiency. This allows you to continue enforcing your data loss prevention requirements only where they are most needed.

Prisma Access Cloud Management Region Support

November 15, 2024
You can now deploy Prisma Access Cloud Management in the Switzerland region.
Supported on:
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
Strata Cloud Manager now supports the following additional regions:
  • Saudi Arabia
  • Israel
  • Indonesia
Strata Cloud Manager for Configuration Management is a solution that is defined and controlled based on the region where it is deployed. You can deploy Strata Cloud Manager in the locations of your choosing, based on data location preferences and where you have the most users. For this reason, we are rolling out region-specific support for Strata Cloud Manager as soon as we are able to do so for each region.

Strata Cloud Manager: New Best Practice Assessment Checks and Custom Checks

November 15, 2024
Supported on Strata Cloud Manager for:
Strata Cloud Manager introduces the following checks:
Strata Cloud Manager lets you validate your configuration against predefined Best Practices and custom checks you create based on the needs of your organization. As you make changes to your service routes, connection settings, allowed services, and administrative access settings for the management and auxiliary interfaces for your firewalls, Strata Cloud Manager gives you assessment results inline so you can take immediate corrective action when necessary. This eliminates problems that misalignments with best practices can introduce, such as conflicts and security gaps.
Inline checks let you:
  • Gauge the effectiveness of, assess the impact of, and validate changes you make to your configuration using inline assessment results.
  • Prioritize and perform remediations based on the recommendations from the inline assessment.

Strata Cloud Manager: Policy Analyzer for Strata Cloud Manager Deployments

November 15, 2024
Supported on Strata Cloud Manager for:
  • NGFW, including those funded by Software NGFW Credits (Managed by Strata Cloud Manager or Panorama)
  • Prisma Access (Managed by Strata Cloud Manager or Panorama)
Policy Analyzer now supports NGFWs and Prisma Access deployments managed by Strata Cloud Manager.
Time-sensitive security policy changes carry the high risk of introducing errors, misconfigurations, or conflicts into the rulebase, requiring slow and complex manual audit processes. Policy integrity is difficult to maintain at scale, leading to decreased performance and potential security gaps. Strata Cloud Manager introduces Policy Analyzer, enabling administrators to optimize time and resources when implementing any change request. Policy Analyzer provides immediate, automated analysis of the security rulebase to ensure policy updates meet defined intent and technical requirements. It proactively checks for anomalies, such as Shadows, Redundancies, Generalizations, Correlations, and Consolidations, that otherwise require labor-intensive manual checking. By identifying conflicting or duplicate rules before deployment, Policy Analyzer streamlines change management, reduces the risk of misconfiguration, and ensures the continued performance and integrity of your network security posture.

Strata Cloud Manager: Role-Based Access Control for Managing and Overriding Security Checks

November 15, 2024
Supported on Strata Cloud Manager for:
  • NGFW
  • Prisma Access
You can create or edit custom checks and override the security check block actions only through the Strata Cloud Manager interface.
Strata Cloud Manager introduces new permissions to enforce access control for managing security checks, managing security check exceptions, and overriding security check block actions. These permissions offer granular control and enhance security by preventing users from making unauthorized changes to the security checks essential for maintaining compliance. The new permissions are:
  • Manage Security Checks
    Security checks are a set of predefined best practice checks and custom checks that evaluate your configuration and identify deviations.
    To view predefined best practice checks and perform actions such as creating, editing, deleting, or cloning custom checks, you will now need the necessary read and write access for the Manage Security Check permission.
  • Manage Security Check Exceptions
    Security check exceptions allow you to turn off specific security checks for certain devices in your environment.
    To manage and view the security check exceptions, you will now need the necessary read and write access for the Manage Security Check Exception permission.
  • Override Security Check Block Action
    You can override the security check block action in two ways:
    • When you push the configuration to the firewall, you can choose to ignore security check failures and continue with the push operation.
    • When you create or edit a Security Policy Rule, Strata Cloud Manager validates the rules against existing security checks. If the checks fail, you can choose to override and save the rule.
    To perform any of the above override operations, you will now need read and write access for Override Security Check Block Action permission.
The following table outlines the predefined roles and the associated new permissions:
RolesPermissions
Superuser
Includes read and write access for the following permissions:
  • Manage Security Checks
  • Manage Security Check Exception
  • Override Security Check Block Action
Network Administrator
Security Administrator
View Only Administrator
Includes read-only access for the following permissions:
  • Manage Security Checks
  • Manage Security Check Exception
For all other predefined roles, Strata Cloud Manager hides the Security Checks and Security Check Exceptions tabs in the Security Posture Settings. Alternatively, you can create or edit existing custom roles and configure the necessary permissions to view, manage, and override security checks.

Configure Source IP Address Enforcement for Authentication Cookies

November 15, 2024
Supported for:
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
You can configure the GlobalProtect portal or gateway to accept cookies from endpoints only when the IP address of the endpoint matches the original source IP addresses for which the cookie was issued or when the IP address of the endpoint matches a specific network IP address range. You can define the network IP address range using a CIDR subnet mask, such as /24 or /32. For example, if an authentication cookie was originally issued to an endpoint with a public source IP address of 201.109.11.10, and the subnet mask of the network IP address range is set to /24, the authentication cookie is subsequently valid on endpoints with public source IP addresses within the 201.109.11.0/24 network IP address range. For more information, see GlobalProtect — Customize App Settings.
This is an existing feature in Panorama and is now introduced in Prisma Access managed by Strata Cloud Manager.

Configure End User Timeout Notifications

November 15, 2024
Supported for:
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
Administrators can now configure timeout settings to notify end users before a GlobalProtect session disconnects. This is an existing feature in Panorama and is now introduced in Prisma Access managed by Strata Cloud Manager.

Strata Cloud Manager: NGFW Alerts in November

November 6, 2024
Here are the NGFW alerts introduced in November 2024:
  • DHCP Client IPv4 address Assignment Failure
  • User authentication unsuccessful - “max_clock_skew”
  • User authentication unsuccessful - received out-of-band SAML message
  • System Drive or Connector fault
  • PA-5450 NC card - FE100 Failure
Health alerts actively monitor the health and performance of your platform in real time. This approach helps in identifying issues, predicting potential problems, and implementing remediation actions to ensure your devices function optimally. Here are some key aspects:
  • Monitoring Metrics: Continuously monitor various metrics from the NGFWs, including CPU utilization, memory usage, disk space, network throughput, and other relevant performance indicators.
  • Anomaly Detection: Generate alerts that dynamically adjust based on the metric's historical value and your usage trends.
  • Predictive Analysis: Leverage historical data and patterns to predict when thresholds might be exceeded or specific events may occur. This helps forecast potential issues before they escalate.