New Features in October 2025
Focus
Focus
Strata Cloud Manager

New Features in October 2025

Table of Contents

New Features in October 2025

Here are the new features we've added to Strata Cloud Manager in October 2025.

New NetSec Platform Features on Strata Cloud Manager (October 2025)

See all the new features made available for Strata Cloud Manager in October 2025.
These new features follow the Strata Cloud Manager release model of continuous feature deployment; as they're ready, we make them available to ensure the latest support for all products and subscriptions across the NetSec platform. There's no Strata Cloud Manager upgrade or management version requirement associated with these features; however, check if they have version or license dependencies associated with other parts of the NetSec platform (like a cloud-delivered security service subscription, or a Prisma Access version, for example)

Streamline Incident Management with Unified Incident Framework

October 17, 2025
Supported for:
  • NGFW and Prisma Access (managed by Strata Cloud Manager)
The Strata Cloud Manager Unified Incident Framework offers a consistent and centralized approach to managing incidents across your various security products. This framework addresses the challenges you face in monitoring diverse network security deployments by consolidating all incidents into a single, unified interface. This gives you comprehensive visibility into your entire security infrastructure.
The unified dashboard displays a summary of all incidents, including the total number of open incidents and breakdowns by product type, category, severity, and priority. You can readily access detailed information for each incident, encompassing the title, severity level, affected objects, recommended remediation steps, and relevant timestamps.
The framework supports flexible notification mechanisms, including email, webhooks, and integrations with ITSM systems, ensuring that you remain informed of critical issues even outside the product interface. You can customize incident settings to focus on issues pertinent to your specific deployments by defining criteria for incident generation and configuring notification preferences.
Strata Cloud Manager now organizes Security Posture Settings under the Unified Incident Framework to deliver a unified and contextual incident management experience. Previously, you could access the security posture check from Configuration > Posture > Settings. With the unified incident framework, these security posture settings have moved to Incidents > Settings. This update aligns all posture-related rules and custom checks with incident workflows, enabling easier correlation between configuration issues and the incidents they generate.
Leveraging the Unified Incident Framework provides the following benefits:
  • Consistent Incident Management: Ensures a uniform approach to incident handling.
  • Faster troubleshooting: Centralized visibility and detailed information facilitate quicker identification and resolution of issues.
  • Informed Decision-Making: Comprehensive context enables a better understanding of the impact and root cause of incidents.
  • Improved Operational Efficiency: Streamlined processes and reduced incident fatigue enhance overall operational effectiveness.
This comprehensive design helps you maintain optimal health and security across your infrastructure, reducing the overhead and inefficiencies associated with managing disparate alerting systems.

Unifying SASE and NGFW Visibility with the NetSec Health Dashboard

October 10, 2025
Supported for:
  • Prisma Access and NGFW (managed by Strata Cloud Manager)
The NetSec Health Dashboard provides a comprehensive view of your organization's network security health across all user devices, branch sites and AI-Powered ADEM monitored applications. Previously, NGFW users lacked a unified way to understand the end-to-end health of users and applications across their organization. This dashboard enhances the existing SASE health dashboard by integrating the health and experience scores from both your Next-Generation Firewall (NGFW) deployments and your Prisma Access (PA) environment into a single pane of glass. Currently, the dashboard shows unified digital experience insights from NGFW deployments for user devices only.
The interactive view in the dashboard shows the experience scores to highlight the status of user devices, sites, and applications in your organization as Good, Fair, and Poor. You can further drill down to analyze user-specific details, users’ browsing experience, network segments causing degradation, and open device incidents. For sites, you can review Prisma SD-WAN and third-party connectivity data and any related open incidents. For monitored applications, the dashboard shows application availability and critical end-to-end performance metrics.

Strata Cloud Manager: IPS Signature Converter Support

October 14, 2025
Supported for:
  • Prisma Access and NGFW (managed by Strata Cloud Manager)
Organizations require rapid, comprehensive threat intelligence but often struggle to leverage security advisories distributed in third-party formats like Snort and Suricata. This challenge leaves network defenses incomplete and vulnerable to emerging threats not yet covered by internal systems. Strata Cloud Manager now allows you to create custom application signatures that can detect, monitor, and prevent network-based attacks, based on Snort signatures and Suricata rules.
Snort and Suricata are third party open-source intrusion prevention system (IPS) tools that utilize specialized rule formats to identify potential threats. Because organizations that share threat intelligence often distribute security advisories using these rule formats, the additional coverage can reveal threats that might not be apparent on any single IPS system. The IPS Signature Converter functionality allows you to leverage these open-source rules for immediate threat protection on Palo Alto Networks Strata Cloud Manager by translating the IPS signatures from Snort and Suricata into custom threat signatures.
After the Snort or Suricata rules are converted, you can use these signatures to enforce security policies by incorporating the converted signatures into your Vulnerability Protection and Anti-Spyware Security Profiles.
By leveraging this conversion process, you can quickly adapt and implement a wide range of threat detection rules from the open-source community, enhancing your network's security posture with up-to-date and comprehensive threat intelligence.