Prisma Access status is Operational

Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Argentina
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Bolivia
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Brazil Central
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Brazil East
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Brazil South
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Canada Central
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Canada East
Wed 11
Thu 12
Fri 13
Sat 14
Sun 15
Mon 16
Tue 17
now
Last updated 1 minute ago from official status page. Learn more
Stay ahead of Prisma Access outages
Sign up to create a custom dashboard to monitor the services you rely on. 3,000+ services supported.

Active Incidents

Commit failures Impacting Applications and Threats Content Update 8852-8753
Started 28 May 2024 04:41:32 (4 months ago), still ongoing
Minor Incident
Investigating
Argentina
Australia East
Andorra
United States - AMER
Bolivia
More...

Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
Major Incident
Monitoring
Argentina
Australia East
Andorra
United States - AMER
Bolivia
More...

For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
Major Incident
Monitoring
Argentina
Australia East
Andorra
United States - AMER
Bolivia
More...

As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

Recently Resolved Incidents

Hood Region: Prisma SD-WAN devices connectivity impacted
Started 11 Sep 2024 22:41:14 (7 days ago), resolved 12 Sep 2024 16:12:23 (6 days ago)
Critical Incident
Resolved
Configuration
Device Status
Metrics & Stats

Prisma SD-WAN devices connectivity to control plane is currently impacted

Prisma Access Outage Survival Guide

A step-by-step guide to help you survive a Prisma Access outage
NaN%

    Prisma Access Components

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access (MU/RN/SC/SWG) - AMER

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Argentina
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Bolivia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Brazil Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Brazil East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Brazil South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Canada Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Canada East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Canada West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Chile
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Colombia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Costa Rica
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Ecuador
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Guatemala
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Mexico Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Mexico West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Panama
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Paraguay
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Peru
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    South America West (Lima)**
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    US Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Central (Chicago)**
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    US Central West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US North Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Northeast
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Northwest
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Southeast
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Southeast (Miami)**
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    US Southwest
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US West Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Uruguay
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Venezuela
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Prisma Access (MU/RN/SC/SWG) - APAC

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Australia East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Australia South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Australia Southeast
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Australia West (Perth)**
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Bangladesh
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Cambodia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Hong Kong
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    India North
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    India South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    India West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Indonesia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Japan Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Japan South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Malaysia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Myanmar
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    New Zealand
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    New Zealand (Auckland)**
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Pakistan South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Pakistan West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Pakistan West (II)
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Papua New Guinea
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Philippines
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Singapore
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    South Korea
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Sri Lanka
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Taiwan
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Thailand
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Vietnam
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Prisma Access (MU/RN/SC/SWG) - EMEA

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Andorra
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Austria
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Bahrain
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Belarus
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Belgium
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Bulgaria
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Croatia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Czech Republic
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Denmark
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Egypt
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Finland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    France North
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    France South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Germany Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Germany North
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Germany South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Ghana
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Greece
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Hungary
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Ireland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Israel
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Italy
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Jordan
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Kazakhstan
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Kenya
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Kuwait
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Latvia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Liechtenstein
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Lithuania
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Luxembourg
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Moldova
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Monaco
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Netherlands Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Netherlands South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Nigeria
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Nigeria (Lagos)**
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Norway
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Poland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Portugal
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Qatar
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Romania
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Russia Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Russia Northwest
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Saudi Arabia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Senegal
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Slovakia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Slovenia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    South Africa Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    South Africa West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Spain Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Spain East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Sweden
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Switzerland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Turkey
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    UK
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Uganda
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Ukraine
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    United Arab Emirates
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Uzbekistan
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Prisma Access FedRAMP (MU/RN/SC/SWG) - AMER

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Brazil South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Canada East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Gov East
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Gov West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Northwest
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Southeast
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Southwest
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    US Central West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access FedRAMP (MU/RN/SC/SWG) - APAC

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Australia Southeast
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    India West
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Japan Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Japan South
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Singapore
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Taiwan
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Indonesia
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access FedRAMP (MU/RN/SC/SWG) - EMEA

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Belgium
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Finland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Germany Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Netherlands Central
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Switzerland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    UK
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Poland
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Insights

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Prisma Access ADEM

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Prisma Access Cloud Management

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    United States - AMER
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Australia - APAC
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Singapore - APAC
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Germany - EMEA
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    United Kingdom - EMEA
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Commit failures Impacting Applications and Threats Content Update 8852-8753
    Started 28 May 2024 04:41:32 (4 months ago), still ongoing
    Minor Incident
    Investigating
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    Palo Alto Networks released Applications and Threats content update package 8852 (dynamic update 8852-8753), which was applied in Prisma Access. This package contained several new functional App-IDs, including google-chat, google-drive-web, google-meet, hubspot, and ringcentral. Any mention of these Apps in PA configuration, will result in a commit error when pushing commits to Prisma Access. Please follow our live community page for remediation actions and updates

    https://live.paloaltonetworks.com/t5/customer-resources/customer-issue-impacting-applications-and-threats-content-update/ta-p/587719

    Recommendations for Addressing Site Access Challenges with Decryption on Google Chrome Browser 124 and Higher
    Started 25 Apr 2024 01:48:48 (5 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    For customers encountering challenges while accessing specific sites with decryption enabled and upon receiving "decrypt-unsupport-param" logs, particularly when using Google Chrome browser version 124 and higher, we suggest trying the following steps:

    Issue Identification: The observed difficulties may arise from Kyber Support integrated by Chrome for the TLS 1.3 version.

    Chrome Flags Configuration: Please review the configuration settings in Chrome Flags. This can be done by navigating to "chrome://flags/#enable-tls13-kyber" and examining the setup.

    Disabling the Option: We encourage you to consider disabling the Kyber Support option and then relaunching the browser to assess if it resolves the issue.

    If you continue to experience any difficulties, please open a support case, sincerely appreciate your patience as we diligently work to resolve this matter.

    Prisma Access Unaffected by Device Certificate Expiration; Check Certificate Expiration for Next-Generation Firewalls Used in Prisma Access Deployments
    Started 26 Dec 2023 03:46:44 (9 months ago), still ongoing
    Major Incident
    Monitoring
    Argentina
    Australia East
    Andorra
    United States - AMER
    Bolivia
    More...

    As part of PAN-OS Root and Default Certificate Expiration on December 31, 2023, the Prisma Access security processing nodes are not affected by the device certificate expiration. However, customers peering with Palo Alto firewall's that are not renewed may face disruptions. Ensure your Palo Alto firewall is updated promptly to maintain seamless connectivity and security. Please follow the guidelines provided in the below advisory:

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Vp5CAE

    Japan - APAC
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Customer Network

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Data Plane
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Policy Enforcements
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Elcapitan Region

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarms & Alerts
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarm & Alert Notifications
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    CloudBlades
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Configuration
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Device Status
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Metrics & Stats
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Topology
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    UI & Portal Access
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Hood Region

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarms & Alerts
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarm & Alert Notifications
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    CloudBlades
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Configuration
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Hood Region: Prisma SD-WAN devices connectivity impacted
    Started 11 Sep 2024 22:41:14 (7 days ago), resolved 12 Sep 2024 16:12:23 (6 days ago)
    Critical Incident
    Resolved
    Configuration
    Device Status
    Metrics & Stats

    Prisma SD-WAN devices connectivity to control plane is currently impacted

    Device Status
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Hood Region: Prisma SD-WAN devices connectivity impacted
    Started 11 Sep 2024 22:41:14 (7 days ago), resolved 12 Sep 2024 16:12:23 (6 days ago)
    Critical Incident
    Resolved
    Configuration
    Device Status
    Metrics & Stats

    Prisma SD-WAN devices connectivity to control plane is currently impacted

    Metrics & Stats
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Hood Region: Prisma SD-WAN devices connectivity impacted
    Started 11 Sep 2024 22:41:14 (7 days ago), resolved 12 Sep 2024 16:12:23 (6 days ago)
    Critical Incident
    Resolved
    Configuration
    Device Status
    Metrics & Stats

    Prisma SD-WAN devices connectivity to control plane is currently impacted

    Topology
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    UI & Portal Access
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Sugarloaf Region

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarms & Alerts
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarm & Alert Notifications
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    CloudBlades
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Configuration
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Device Status
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Metrics & Stats
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Topology
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    UI & Portal Access
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Faber Region

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarms & Alerts
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarm & Alert Notifications
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    CloudBlades
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Configuration
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Device Status
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Metrics & Stats
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Topology
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    UI & Portal Access
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Townsend Region

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarms & Alerts
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarm & Alert Notifications
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    CloudBlades
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Configuration
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Device Status
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Metrics & Stats
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Topology
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    UI & Portal Access
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Prisma SD-WAN - Bowfell Region

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarms & Alerts
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Alarm & Alert Notifications
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    CloudBlades
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Device Status
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Configuration
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Metrics & Stats
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Topology
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    UI & Portal Access
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access China (MU/RN/SC)

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Prisma Access Alternatives

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    Cloudflare Sites and Services

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    API
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Elevated error rate on DNS records API
    Started 18 Sep 2024 14:31:06 (1 hour ago), still ongoing
    Minor Incident
    Investigating
    API

    Cloudflare is investigating an elevated error rate on DNS record API endpoints. We are working to understand the full impact and mitigate this problem. More updates to follow shortly.

    See all
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    IPVanish Server Status

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    MEL - Melbourne, Australia
    Started 7 Jul 2024 17:55:52 (2 months ago), still ongoing
    Major Incident
    Identified
    Server Status

    We are currently investigating a potential service impacting situation in this location. There is partial outage at this location that is affecting connections to some of the servers.

    See all
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    StrongVPN Server Status

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    See all
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now

    FortiLAN Cloud Europe

    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    REST API
    Wed 11
    Thu 12
    Fri 13
    Sat 14
    Sun 15
    Mon 16
    Tue 17
    now
    Europe: REST API: service is facing Partial Outage.
    Started 18 Sep 2024 08:13:52 (7 hours ago), still ongoing
    Major Incident
    Monitoring
    REST API

    We have encountered some issues in ourREST API services. We are investigating it. Identifier: Domain: europe, 0a4f132a

    See all