<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prisma Access Explicit Proxy — Anti‑Spyware behavior when DNS bypasses Prisma (logging subtype + test methodology) in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-explicit-proxy-anti-spyware-behavior-when-dns/m-p/1248662#M1278</link>
    <description>&lt;P&gt;&lt;SPAN data-teams="true"&gt;Attention: JAPAC TPM Team&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Hello Team,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I have a question about the Anti-Spyware profile behavior in a Prisma Access (Explicit Proxy) environment.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;&lt;BR /&gt;- Clients use Explicit Proxy to reach Prisma Access for web traffic.&lt;BR /&gt;- DNS resolution does not traverse Prisma Access (it is resolved by a local resolver / another path).&lt;BR /&gt;- An Anti-Spyware profile is attached to the relevant security policy.&lt;BR /&gt;- SSL decryption: enabled/disabled (please advise if this matters in this scenario).&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Questions&lt;/STRONG&gt;&lt;BR /&gt;1. When client DNS queries do not traverse Prisma Access, is it correct that Anti-Spyware detections would rely on payload-based signatures (and not DNS signatures / sinkhole)?&lt;BR /&gt;2. In such a case, should detections appear in the Threat log with subtype: spyware? Is there any difference in the logging behavior compared to DNS signature/sinkhole events?&lt;BR /&gt;3. I couldn’t find an official knowledge base article that specifically tests this scenario. Is there a recommended test methodology to validate Anti-Spyware behavior with Explicit Proxy when DNS is out‑of‑path?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Constraints&lt;/STRONG&gt;&lt;BR /&gt;I currently don’t have access to a live traffic test environment, so any guidance, example steps, or references would be greatly appreciated.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;P&gt;Thank you in advance for your assistance.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-rating-metoo lia-component-me-too lia-component-message-view-widget-me-too"&gt;
&lt;DIV class="RatingDisplay lia-component-ratings-widget-rating-display"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 20 Feb 2026 08:45:20 GMT</pubDate>
    <dc:creator>Imas4to</dc:creator>
    <dc:date>2026-02-20T08:45:20Z</dc:date>
    <item>
      <title>Prisma Access Explicit Proxy — Anti‑Spyware behavior when DNS bypasses Prisma (logging subtype + test methodology)</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-explicit-proxy-anti-spyware-behavior-when-dns/m-p/1248662#M1278</link>
      <description>&lt;P&gt;&lt;SPAN data-teams="true"&gt;Attention: JAPAC TPM Team&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Hello Team,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I have a question about the Anti-Spyware profile behavior in a Prisma Access (Explicit Proxy) environment.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Scenario&lt;/STRONG&gt;&lt;BR /&gt;- Clients use Explicit Proxy to reach Prisma Access for web traffic.&lt;BR /&gt;- DNS resolution does not traverse Prisma Access (it is resolved by a local resolver / another path).&lt;BR /&gt;- An Anti-Spyware profile is attached to the relevant security policy.&lt;BR /&gt;- SSL decryption: enabled/disabled (please advise if this matters in this scenario).&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Questions&lt;/STRONG&gt;&lt;BR /&gt;1. When client DNS queries do not traverse Prisma Access, is it correct that Anti-Spyware detections would rely on payload-based signatures (and not DNS signatures / sinkhole)?&lt;BR /&gt;2. In such a case, should detections appear in the Threat log with subtype: spyware? Is there any difference in the logging behavior compared to DNS signature/sinkhole events?&lt;BR /&gt;3. I couldn’t find an official knowledge base article that specifically tests this scenario. Is there a recommended test methodology to validate Anti-Spyware behavior with Explicit Proxy when DNS is out‑of‑path?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Constraints&lt;/STRONG&gt;&lt;BR /&gt;I currently don’t have access to a live traffic test environment, so any guidance, example steps, or references would be greatly appreciated.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;P&gt;Thank you in advance for your assistance.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-rating-metoo lia-component-me-too lia-component-message-view-widget-me-too"&gt;
&lt;DIV class="RatingDisplay lia-component-ratings-widget-rating-display"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 20 Feb 2026 08:45:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-explicit-proxy-anti-spyware-behavior-when-dns/m-p/1248662#M1278</guid>
      <dc:creator>Imas4to</dc:creator>
      <dc:date>2026-02-20T08:45:20Z</dc:date>
    </item>
  </channel>
</rss>

