An instance of the Prisma Access server is also known as a tenant . If your administrators set up multiple Prisma Access servers, you can connect to a different server to access the network or the resources through that server.
For example, you need to work on a different project, but that project is only accessible on a different server. You will need to connect to that server before you can change to that project.
from the macOS menu bar or Windows taskbar.
The format of the server name is <xxx>.epm.gpcloudservice.com without the https:// . The maximum length of the server name is 256 characters. The maximum number of servers allowed on this page is 20.
If your administrator allows it, you can temporarily disable the Prisma Access Agent. This is helpful on devices where other secure access apps, such as the GlobalProtect app, coexists with the Prisma Access Agent. In this case, you will have to disable the Prisma Access Agent before you can switch to the other app.
After you disable the Prisma Access Agent, the agent is in the disabled state, where:
To disable the Prisma Access Agent:
in your taskbar.
If you're disabling the agent for the first time or if you don't see the Disable link in the settings page, sign out of the Prisma Access Agent.
The Prisma Access Agent is disabled.
The Prisma Access Agent functionality will resume.
In some organizations, the Prisma Access Agent is installed on user devices that already have the GlobalProtect app installed. After installing the Prisma Access Agent, you can switch between the Prisma Access Agent and the GlobalProtect app as needed.
After switching to the GlobalProtect app, the Prisma Access Agent is in the disabled state. In the disabled state:
Both Prisma Access Agent and GlobalProtect use the same GlobalProtect port to listen to MFA requests (for additional authentication for certain applications), but only one agent can use the port at a time. When you disable the Prisma Access Agent, the port will be released for use by GlobalProtect.
You can use either the Prisma Access Agent app or the Prisma Access command-line tool (PACli) to switch between the two apps.
Before switching to the GlobalProtect™ app, you need to disable the Prisma Access Agent. If your administrator configured the feature to allow users to disable the Prisma Access Agent, you can use the app to disable the Prisma Access Agent. After you disable the Prisma Access Agent, you can start the GlobalProtect app.
Your administrator must contact the Palo Alto Networks team to enable this tenant-level feature. It's not available as an agent setting on Strata Cloud Manager.
If you're disabling the agent for the first time, open the Prisma Access Agent app and sign out of the Prisma Access Agent.
The Prisma Access Agent is disabled.
If the agent is in On-Demand mode, the Prisma Access Agent is enabled but remains disconnected. Click the lock icon to connect to the Prisma Access location.
Dynamic Privilege Access enables Prisma Access to apply different network and Security policy rules to mobile user flows based on the project your users are working on. Go to InsightsUsers in the Strata Cloud Manager Command Center to view user-based access information in your environment.
Connected Users
View Connected Users to view current connected users or connected user devices. The up or down arrow compares this time range with a previous time range to determine the difference, in percentage, in number of connected users or devices.
Select View Trend by Users to view the number of users currently connected to Prisma Access Agent, and click View Trend by User Devices to see the number of user devices currently connected to Prisma Access Agent.
View Project Distribution by Theatre to see the number of projects by location, or theater.
The Users | Devices table shows the Project Name associated with each user and device. You can also see how many devices are connected by user, last login time, last source location, last connected Prisma Access location, the source Internet Protocol, and OS family and version.
Select any Project Name to go to the Projects page.
Select any User Name to view user details such as Activity and Connectivity .
Activity
URL Browsing Category Summary- Data Transfer —View your browsing category data transfer summary By Data Transfer or By Session Count . You can also view a list of the Top 10 URL Categories , sorted by data transferred.
URL Browsing Summary —See your URL browsing summary, including all URLs that you accessed by risk. You can view a breakdown of URLs by risk (High, Medium, or Low) and see how many malicious URLs you accessed. You can also view a list of the Top 10 URLs visited, and how many times you visited each URL.
View URL Filtering Logs —Select View URL Filtering Logs to view details about total data transferred. The logs provide an audit trail for system, configuration, and network events. Network logs record all events where Prisma Access acts on your network.
Blocked URLs by Risk —See whether you have accessed, or tried to access, any URLs blocked by risk. High-risk URLs might create additional security challenges, such as exposure to potential threat propagation, data loss, or compliance violations. Enforce any policy changes necessary to block any undesired sites. You can also see a list of the Top 10 Blocked URLs that you visited most, sorted by the number of sessions.
Severe Threats —See how many of your threats are severe. Severe threats are further broken down into Critical, High, and Medium threats. You can also view a list of the Top 10 Severe Threats Seen in your environment.
Connectivity
Select any User name to view information about the user's Connectivity during the Time Range selected.
Active Projects —You can see which projects were active during the time range you selected, and the date that each project became active.
Connected User's Devices Trend and Connected User's Devices —On the main Users page, you could see all connected users and their projects. On the Connectivity page, view your individual Connected User's Devices trend during the time range selected and details about your Connected User's Devices , such as device name, last user source IP address, last private IP address, last user location, last login time, last logout time, and last session duration.
Project Activity —View a user's project activity by session. You can see the current status of a session, when the user logged into each project, when they logged out, and how long each session lasted.
Total User Activity by Project —View the time a user spent on each project during the time range selected.
Gain visibility into your Prisma Access Agent deployment by using Strata Cloud Manager to monitor your users' project activity. Go to Activity InsightsProjects in the Strata Cloud Manager Command Center to view project-based access information in your environment.
Projects
The Projects table provides an overall view about the projects your users access using Prisma Access during the selected time range. You can see each project's number of connected users, peak number of users, maximum allowed users, Prisma Access location groups, IP address pool allocated, the IP pool utilized, number of available IP addresses, and the last connected Prisma Access location.
Select a Project Name to go to that project's details page. The project name (blurred in the following image) appears in the upper left corner of the page.
Overview
On the project details page, Overview shows the maximum allowed users for this project and the peak number of users during the selected time range.
IP Pools - Utilization
View the number of IPs in use and the number of IPs that are still available for the pools in this project. Select a specific IP pool to go to its details page (see the following image), where you can see this IP pool's utilization, the number of IP addresses used, and IP address utilization by Prisma Access location group.
Connected Users
View a graph of the users connected during the selected time range. Hover over any point in the graph to see the user count at that point.
Connected Users by Location Groups
View the number of users by the Prisma Access Location Group they're in. You can also see the number of IP addresses in use for each Location Group .
Automatic tunnel restoration enhances the end-user experience by maintaining consistent and efficient connectivity for Prisma Access Agents. This feature automatically restores secure connections after interruptions, reducing user frustration and minimizing work disruptions.
Automatic tunnel restoration is a standard feature of Prisma Access Agents so no configuration is required for it to work. To understand automatic tunnel restoration, you should be familiar with the following key concepts:
Connectivity Modes
Depending on how you configured the Prisma Access Agent, your users will connect to a gateway using one of the following modes:
Location Selection
Your users can connection to a location using (gateway) the following methods:
Monitoring and System Changes
Prisma Access Agent monitors various network and system changes, including:
Restoration Window
The Prisma Access Agent will attempt to restore the connection for up to 30 minutes after an interruption occurs. This time frame will help to significantly reduce manual reconnections due to changes in network conditions.
Tunnel restoration behavior differs depending on the connectivity mode for the agent.
Tunnel Restoration in Always On Mode
In Always On mode, the Prisma Access Agent actively attempts to maintain a constant connection:
Tunnel Restoration in On-Demand Mode
In On-Demand mode, the restoration behavior depends on how the connection was initiated:
In both modes, Prisma Access Agent monitors network and system changes to trigger restoration attempts when necessary, ensuring optimal connectivity within the 30-minute restoration window.