
Prisma Access Status
Real-time updates of Prisma Access issues and outages
Prisma Access status is Operational
Visibility & Reporting (Base Visibility)
Visibility & Reporting (Base Visibility)
Visibility & Reporting (Base Visibility)
Visibility & Reporting (Base Visibility)
Visibility & Reporting (Base Visibility)
Visibility & Reporting (Base Visibility)
Visibility & Reporting (Base Visibility)
Active Incidents
Palo Alto Networks is always working to enhance our services. As a part of an emergency maintenance activity, PANW Engineering will be rolling out code changes to enhance RBI services. This emergency maintenance activity is on Friday, 7th Feb, from 5:00 PM UTC to 9:00 PM UTC. Customers using RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience, and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please reach out to the support team or your customer success representatives if you have any questions.
“Customers using DNS security logging are at risk of a ‘Denial of Service’ vulnerability, allowing attackers to send a malicious packet through the firewall’s data plane, triggering a reboot. Affected customers will receive an insights notification and will be scheduled for an upgrade starting the weekend of January 3rd, 2025. In the meantime, we strongly recommend implementing the workaround detailed at https://security.paloaltonetworks.com/CVE-2024-3393 to mitigate the risk.”
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE
Recently Resolved Incidents
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
We are noticing intermitted failures in Log Viewer on US Prod region. We are looking into this issue.
NGFW remote users dashboards are impacted. We are continuing to work on the fix.
Palo Alto Networks is always working to enhance our services. As a part of scheduled maintenance activity, PANW Engineering will be rolling out code changes to enhance RBI services. This emergency maintenance activity is on Saturday, 1st February, from 04:00 PM UTC to 08:00 PM UTC. Customers using RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please contact the support team or your customer success representatives if you have any questions.
Palo Alto Networks is always working to enhance our services. As a part of an emergency maintenance activity, PANW Engineering will be rolling out code changes to enhance RBI services. This emergency maintenance activity is on Friday, 31st January, from 5:00 PM UTC to 9:00 PM UTC. Customers using RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please contact the support team or your customer success representatives if you have any questions.
Prisma Access Outage Survival Guide
Prisma Access Components
Prisma Access Strata Cloud Manager North America (Canada)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Alerts & Incidents (AIOps & Insights)
Commercial Website
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager North America (United States)
HUB UI
Commercial Website
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
We are noticing intermitted failures in Log Viewer on US Prod region. We are looking into this issue.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager Europe (United Kingdom)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager Europe (Germany)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager Europe (Switzerland)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager APAC (Singapore)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager APAC (India)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager APAC (Japan)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager APAC (Australia)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Strata Cloud Manager Middle East (Qatar)
HUB UI
Authentication Service (CIE)
Configuration
Application Experience (ADEM)
Visibility & Reporting (Base Visibility)
Some customers may experience difficulties in viewing logs on their Strata Cloud Manager log viewer or SLS Explore. The Palo Alto Networks engineering team is currently investigating this issue and will provide an update on the service shortly.
Alerts & Incidents (AIOps & Insights)
Notification (Email, Webhooks, SNOW integration)
Copilot
AI Runtime Security (AIRS)
Admin Console
Prisma Access Control Plane
Prisma Access FedRAMP Control Plane
Prisma Access Control Plane China
Prisma Access Agent Manager
Prisma Access Prisma RBI Control Plane
Palo Alto Networks is always working to enhance our services. As a part of an emergency maintenance activity, PANW Engineering will be rolling out code changes to enhance RBI services. This emergency maintenance activity is on Friday, 31st January, from 5:00 PM UTC to 9:00 PM UTC. Customers using RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please contact the support team or your customer success representatives if you have any questions.
Palo Alto Networks is always working to enhance our services. As a part of scheduled maintenance activity, PANW Engineering will be rolling out code changes to enhance RBI services. This emergency maintenance activity is on Saturday, 1st February, from 04:00 PM UTC to 08:00 PM UTC. Customers using RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please contact the support team or your customer success representatives if you have any questions.
Palo Alto Networks is always working to enhance our services. As a part of an emergency maintenance activity, PANW Engineering will be rolling out code changes to enhance RBI services. This emergency maintenance activity is on Friday, 7th Feb, from 5:00 PM UTC to 9:00 PM UTC. Customers using RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience, and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please reach out to the support team or your customer success representatives if you have any questions.
Prisma Access Browser Control Plane - US Region
Cloud Collectors
Browser Update Service
Authentication Service
Admin Console
Prisma Access Browser Control Plane - EU Region
Cloud Collectors
Browser Update Service
Authentication Service
Admin Console
Prisma Access Cloud Management
United States - AMER
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE
Australia - APAC
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE
Singapore - APAC
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE
Germany - EMEA
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE
United Kingdom - EMEA
Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates
For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:
Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.
Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.
Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.
If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.
As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE