Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Server

An instance of the Prisma Access server is also known as a  tenant . If your administrators set up multiple Prisma Access servers, you can connect to a different server to access the network or the resources through that server.

For example, you need to work on a different project, but that project is only accessible on a different server. You will need to connect to that server before you can change to that project.

  1. Launch the Prisma Access Agent by clicking the Prisma Access Agent icon 

 

from the macOS menu bar or Windows taskbar.

  1. Edit the server settings by selecting the server management icon.

  1. The server information appears showing the server that you're connected to. If other servers are listed, you can select one and  Connect  to it.

  1. If you need to add a server, complete the following steps:
    1. Click the  +  sign.
    2. Enter the new server name (provided by your administrator) and  Add  it.

The format of the server name is <xxx>.epm.gpcloudservice.com without the  https:// . The maximum length of the server name is 256 characters. The maximum number of servers allowed on this page is 20.

    1. After adding the server, select it and click  Connect .
  1. When the Confirmation window appears, click  Yes  to disconnect from the current server and connect to the other server. You will need to provide your sign-on credentials again.
  2. When prompted,  log in  to the new server by providing the project name (if applicable).

Disable the Dynamic Privilege Access Enabled Prisma Access Agent

If your administrator allows it, you can temporarily disable the Prisma Access Agent. This is helpful on devices where other secure access apps, such as the GlobalProtect app, coexists with the Prisma Access Agent. In this case, you will have to disable the Prisma Access Agent before you can switch to the other app.

After you disable the Prisma Access Agent, the agent is in the disabled state, where:

To disable the Prisma Access Agent:

  1. Open the Prisma Access Agent app by clicking the Prisma Access Agent icon 

 

in your taskbar.

If you're disabling the agent for the first time or if you don't see the  Disable  link in the settings page, sign out of the Prisma Access Agent.

    1. Select the hamburger menu and select  Sign Out .
    2. Log in to the Prisma Access Agent app again to make the  Disable  link appear in the settings window.
  1. Click the hamburger menu to open the settings window.

  1. Disable  the Prisma Access Agent.

  1. Close the settings window by clicking the  X .

The Prisma Access Agent is disabled.

  1. To reenable the Prisma Access Agent:
    1. Open the Prisma Access Agent.
    2. Select the hamburger menu and  Enable  the Prisma Access Agent.

The Prisma Access Agent functionality will resume.

Switch Between the Prisma Access Agent and GlobalProtect App

In some organizations, the Prisma Access Agent is installed on user devices that already have the GlobalProtect app installed. After installing the Prisma Access Agent, you can switch between the Prisma Access Agent and the GlobalProtect app as needed.

After switching to the GlobalProtect app, the Prisma Access Agent is in the disabled state. In the disabled state:

Both Prisma Access Agent and GlobalProtect use the same GlobalProtect port to listen to MFA requests (for additional authentication for certain applications), but only one agent can use the port at a time. When you disable the Prisma Access Agent, the port will be released for use by GlobalProtect.

You can use either the Prisma Access Agent app or the Prisma Access command-line tool (PACli) to switch between the two apps.

Before switching to the GlobalProtect™ app, you need to disable the Prisma Access Agent. If your administrator configured the feature to allow users to disable the Prisma Access Agent, you can use the app to disable the Prisma Access Agent. After you disable the Prisma Access Agent, you can start the GlobalProtect app.

Your administrator must contact the Palo Alto Networks team to enable this tenant-level feature. It's not available as an agent setting on Strata Cloud Manager.

If you're disabling the agent for the first time, open the Prisma Access Agent app and sign out of the Prisma Access Agent.

The Prisma Access Agent is disabled.

If the agent is in On-Demand mode, the Prisma Access Agent is enabled but remains disconnected. Click the lock icon to connect to the Prisma Access location.

View and Monitor Dynamic Privilege Access Users

Dynamic Privilege Access enables Prisma Access to apply different network and Security policy rules to mobile user flows based on the project your users are working on. Go to  InsightsUsers  in the Strata Cloud Manager Command Center to view user-based access information in your environment.

Connected Users

View  Connected Users  to view current connected users or connected user devices. The up or down arrow compares this time range with a previous time range to determine the difference, in percentage, in number of connected users or devices.

Select  View Trend by Users  to view the number of users currently connected to Prisma Access Agent, and click  View Trend by User Devices  to see the number of user devices currently connected to Prisma Access Agent.

View  Project Distribution by Theatre  to see the number of projects by location, or theater.

The  Users | Devices  table shows the  Project Name  associated with each user and device. You can also see how many devices are connected by user, last login time, last source location, last connected Prisma Access location, the source Internet Protocol, and OS family and version.

Select any  Project Name  to go to the  Projects  page.

Select any  User Name  to view user details such as  Activity  and  Connectivity .

Activity

URL Browsing Category Summary- Data Transfer —View your browsing category data transfer summary  By Data Transfer  or  By Session Count . You can also view a list of the  Top 10 URL Categories , sorted by data transferred.

URL Browsing Summary —See your URL browsing summary, including all URLs that you accessed by risk. You can view a breakdown of URLs by risk (High, Medium, or Low) and see how many malicious URLs you accessed. You can also view a list of the  Top 10 URLs  visited, and how many times you visited each URL.

View URL Filtering Logs —Select  View URL Filtering Logs  to view details about total data transferred. The logs provide an audit trail for system, configuration, and network events. Network logs record all events where Prisma Access acts on your network.

Blocked URLs by Risk —See whether you have accessed, or tried to access, any URLs blocked by risk. High-risk URLs might create additional security challenges, such as exposure to potential threat propagation, data loss, or compliance violations. Enforce any policy changes necessary to block any undesired sites. You can also see a list of the  Top 10 Blocked URLs  that you visited most, sorted by the number of sessions.

Severe Threats —See how many of your threats are severe. Severe threats are further broken down into Critical, High, and Medium threats. You can also view a list of the  Top 10 Severe Threats Seen  in your environment.

Connectivity

Select any  User  name to view information about the user's  Connectivity  during the  Time Range  selected.

Active Projects —You can see which projects were active during the time range you selected, and the date that each project became active.

Connected User's Devices Trend and Connected User's Devices —On the main Users page, you could see all connected users and their projects. On the  Connectivity  page, view your individual  Connected User's Devices  trend during the time range selected and details about your  Connected User's Devices , such as device name, last user source IP address, last private IP address, last user location, last login time, last logout time, and last session duration.

Project Activity —View a user's project activity by session. You can see the current status of a session, when the user logged into each project, when they logged out, and how long each session lasted.

Total User Activity by Project —View the time a user spent on each project during the time range selected.

View and Monitor Dynamic Privilege Access Projects

Gain visibility into your Prisma Access Agent deployment by using Strata Cloud Manager to monitor your users' project activity. Go to  Activity InsightsProjects  in the Strata Cloud Manager Command Center to view project-based access information in your environment.

Projects

The  Projects  table provides an overall view about the projects your users access using Prisma Access during the selected time range. You can see each project's number of connected users, peak number of users, maximum allowed users, Prisma Access location groups, IP address pool allocated, the IP pool utilized, number of available IP addresses, and the last connected Prisma Access location.

Select a  Project Name  to go to that project's details page. The project name (blurred in the following image) appears in the upper left corner of the page.

Overview

On the project details page,  Overview  shows the maximum allowed users for this project and the peak number of users during the selected time range.

IP Pools - Utilization

View the number of IPs in use and the number of IPs that are still available for the pools in this project. Select a specific IP pool to go to its details page (see the following image), where you can see this IP pool's utilization, the number of IP addresses used, and IP address utilization by Prisma Access location group.

Connected Users

View a graph of the users connected during the selected time range. Hover over any point in the graph to see the user count at that point.

Connected Users by Location Groups

View the number of users by the Prisma Access  Location Group  they're in. You can also see the number of IP addresses in use for each  Location Group .

Automatic Tunnel Restoration in Dynamic Privilege Access Prisma Access Agents

Automatic tunnel restoration enhances the end-user experience by maintaining consistent and efficient connectivity for Prisma Access Agents. This feature automatically restores secure connections after interruptions, reducing user frustration and minimizing work disruptions.

Automatic tunnel restoration is a standard feature of Prisma Access Agents so no configuration is required for it to work. To understand automatic tunnel restoration, you should be familiar with the following key concepts:

Connectivity Modes

Depending on how you configured the Prisma Access Agent, your users will connect to a gateway using one of the following modes:

Location Selection

Your users can connection to a location using (gateway) the following methods:

Monitoring and System Changes

Prisma Access Agent monitors various network and system changes, including:

Restoration Window

The Prisma Access Agent will attempt to restore the connection for up to 30 minutes after an interruption occurs. This time frame will help to significantly reduce manual reconnections due to changes in network conditions.

Tunnel restoration behavior differs depending on the connectivity mode for the agent.

Tunnel Restoration in Always On Mode

In Always On mode, the Prisma Access Agent actively attempts to maintain a constant connection:

Tunnel Restoration in On-Demand Mode

In On-Demand mode, the restoration behavior depends on how the connection was initiated:

In both modes, Prisma Access Agent monitors network and system changes to trigger restoration attempts when necessary, ensuring optimal connectivity within the 30-minute restoration window.