<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PRISMA ACCESS : Questions on the Limits of Threat Detection and Compliance with ZTNA 2.0 in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-questions-on-the-limits-of-threat-detection-and/m-p/571093#M646</link>
    <description>&lt;P&gt;Hello everyone!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;After exploring the PRISMA ACCESS demo available here : [demo link] (&lt;A href="https://www.paloaltonetworks.com/partners/nextwave-partner-portal/help-me-learn/demo-systems/prisma-access" target="_blank"&gt;https://www.paloaltonetworks.com/partners/nextwave-partner-portal/help-me-learn/demo-systems/prisma-access&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a question for you: If I use Prisma Access as a stand-alone solution without integrating it with Cortex XDR, how far can it go in terms of threat detection and vulnerability analysis?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, regarding ZTNA 2.0, I've heard that it can provide continuous compliance monitoring through host-based policies.&lt;/P&gt;
&lt;P&gt;- But how far can it push these policies?&lt;/P&gt;
&lt;P&gt;- Can it detect misconfigured or disabled settings on the endpoint?&lt;/P&gt;
&lt;P&gt;- And how far can it restrict a non-compliant host?&lt;/P&gt;
&lt;P&gt;- For example, if the antivirus is disabled, I know it can be considered non-compliant and cause pings to be blocked to the host, but what other type of policy can be put in place, with concrete examples?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm open to all kinds of feedback and would appreciate any views or experiences you could share on these topics! Feel free to add your observations and suggestions. Thanks in advance for your contribution!&lt;/P&gt;</description>
    <pubDate>Thu, 28 Dec 2023 08:28:01 GMT</pubDate>
    <dc:creator>bastien.guidone</dc:creator>
    <dc:date>2023-12-28T08:28:01Z</dc:date>
    <item>
      <title>PRISMA ACCESS : Questions on the Limits of Threat Detection and Compliance with ZTNA 2.0</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-questions-on-the-limits-of-threat-detection-and/m-p/571093#M646</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;After exploring the PRISMA ACCESS demo available here : [demo link] (&lt;A href="https://www.paloaltonetworks.com/partners/nextwave-partner-portal/help-me-learn/demo-systems/prisma-access" target="_blank"&gt;https://www.paloaltonetworks.com/partners/nextwave-partner-portal/help-me-learn/demo-systems/prisma-access&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a question for you: If I use Prisma Access as a stand-alone solution without integrating it with Cortex XDR, how far can it go in terms of threat detection and vulnerability analysis?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, regarding ZTNA 2.0, I've heard that it can provide continuous compliance monitoring through host-based policies.&lt;/P&gt;
&lt;P&gt;- But how far can it push these policies?&lt;/P&gt;
&lt;P&gt;- Can it detect misconfigured or disabled settings on the endpoint?&lt;/P&gt;
&lt;P&gt;- And how far can it restrict a non-compliant host?&lt;/P&gt;
&lt;P&gt;- For example, if the antivirus is disabled, I know it can be considered non-compliant and cause pings to be blocked to the host, but what other type of policy can be put in place, with concrete examples?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm open to all kinds of feedback and would appreciate any views or experiences you could share on these topics! Feel free to add your observations and suggestions. Thanks in advance for your contribution!&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 08:28:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-questions-on-the-limits-of-threat-detection-and/m-p/571093#M646</guid>
      <dc:creator>bastien.guidone</dc:creator>
      <dc:date>2023-12-28T08:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: PRISMA ACCESS : Questions on the Limits of Threat Detection and Compliance with ZTNA 2.0</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-questions-on-the-limits-of-threat-detection-and/m-p/571273#M647</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;I have a question for you: If I use Prisma Access as a stand-alone solution without integrating it with Cortex XDR, how far can it go in terms of threat detection and vulnerability analysis?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;Prisma Access as a standalone product can do all the things a NGFW can do, so any transit traffic can be inspected for threats and threat indicators, and upload files to wildfire for sandbox analysis&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, regarding ZTNA 2.0, I've heard that it can provide continuous compliance monitoring through host-based policies.&lt;/P&gt;
&lt;P&gt;- But how far can it push these policies?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;This is outside of the scope of prisma access as standalone product. prisma access provides traffic security and can isolate an endpoint by means of connectivity&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;- Can it detect misconfigured or disabled settings on the endpoint?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;Prisma Access can't, you would need XDR&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;- And how far can it restrict a non-compliant host?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;HIP checks can be used to completely isolate an endpoint, or restrict it in such a way that it is still accessible by IT and is able to reach remediation serrvices but blocked from everything else&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;- For example, if the antivirus is disabled, I know it can be considered non-compliant and cause pings to be blocked to the host, but what other type of policy can be put in place, with concrete examples?&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;hip checks can be created (check the full list of option in the link below) and then profiles created around these checks.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;these profiles can then be used in security policies to determine what connectivity is allowed from the host&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;additionally the host can be quarantined completely isolating it from the world&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008080"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/globalprotect/objects-globalprotect-hip-objects&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Dec 2023 22:15:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-questions-on-the-limits-of-threat-detection-and/m-p/571273#M647</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-12-29T22:15:26Z</dc:date>
    </item>
  </channel>
</rss>

