Prisma Access Browser
Prisma Access Mobile Browser
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
Prisma Access Mobile Browser
This provides the information regarding the Prisma Access Mobile Browser
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Prisma® Access Mobile Browser works with both Android and iOS devices. The
browser easily integrates with the Prisma Access Secure Enterprise Browser and console,
allowing you and your end users to include mobile devices in the tool sets.
The Prisma Access Browser and the Prisma Access Mobile Browser share policy
rules. However, some controls within the policy rules can operate differently, or are
not available. For example, the File Download control skips the setting for
specific file extensions because it's not supported for mobile use. As a result,
enabling this setting causes the Mobile Browser to block all file downloads.
The Prisma Access Mobile Browser enables you to use the most common
functionality from the regular browser. We recommend that you create rules with the
appropriate device groups in the Scope. This will allow you to properly manage the
Mobile device users. By defining device groups for mobile devices, you can set different
rule sets to apply for all mobile devices.
Important
When using iOS version 17 and its minor versions, users may encounter
errors when routing public or private traffic through Prisma Access. To avoid this
issue, we recommend upgrading to iOS 18.
If you are using iOS 17, you can explicitly exclude these versions from
being routed through Prisma Access by following these steps:
- Create a mobile device group:
- In the Devices page, click on the device group tab.
- Click Add device group.
- Click on Mobile to display the available Posture Attributes for mobile devices.
- Select OS versions.
- Click Select Versions.
- Select iOS 17.
- Click Save.
- Click Create.
- Create a Customization rule:
- Select Add a new rule.
- Select Browser Customization:
- Name the rule.
- Select the mobile device group you have created.
- In Browser Customization controls, select “Traffic Flow.”
- Click “Do not route traffic through Prisma Access:”Mobile Devices: To ensure an optimal experience with Network Detection and Prisma Access, either route only Private App traffic, or exclude the Mobile Device group from routing.
- Click “Do not route traffic through Prisma Access:”
Onboard Prisma Access Mobile Browser from the Strata Cloud Manager
In the onboarding phase, you can install the Android and iOS Prisma Access Mobile
Browser apps to test on your own devices before sending the links out to your users.
Once you're satisfied with your tests, you can install the relevant Android and iOS
apps and distribute the links to your users via your mobile device management (MDM)
application.
Install the Prisma Access Mobile Browser
You can download the Prisma Access Mobile Browser from the following
locations:
- iOS App Store
- Android Google Play
Additionally, when you access the regular download link https://get.pabrowser.com/ from a mobile device, the URL
directs you to the relevant app store. This means that you can send a single link to
your users, even when you don't know their particular device.
Create Prisma Access Browser Mobile Device Groups
The Prisma Access Mobile Browser has a device group function that allows you to
create different groups for different devices. Groups are dynamic. For example, you
can set up groups for specific managed devices, different subsidiary devices, or
contractors. As an administrator, you can exercise a considerable amount of
flexibility in configuring the mobile device groups you need within your
organization. For example, groups meet changing business, operational, and
organizational circumstances. You can use device groups either with sign-in rules to
set the security bar for accessing Prisma Access Mobile Browser, or with
posture-focused scoping for policy rules.
For more information, see Manage Device Groups.
Configure Mobile Browser Posture Attributes
The Prisma Access Mobile Browser allows you to configure the posture requirements
for your devices running the Mobile Browser in the same way that it configures
posture for your desktop and laptop devices running the Prisma Access Browser.
For more information on the available Mobile Browser attributes, refer to Configure Prisma Access Mobile Browser Device
Posture Attributes.
Configure Prisma Access Mobile Browser Sign-In Rules
Along with the various policy rules, the Sign-in rules act as a security
measures. Before relying on the policy rules, the Sign-in rules serve as the first
access gatekeeper for Users and Devices.
When you create a Sign-in rule, make sure that the Scope contains the Users and User
Groups and Device Groups that are designed for the Mobile Browser.
While the Prisma Access Mobile Browser's Sign-in rules are
configured the same way as the Sign-in rules for the Prisma Access Browser, be aware
of the following exception:
Starting with iOS browser version 1.4259 and
Android browser version 1.4260, the Prompt action functions as
Block. For all earlier versions, it functions as
Allow.
Configure Prisma Access Mobile Browser Policy Rules
The Prisma Access Mobile Browser has various policy rules that you can configure to
create rules as you require. The configuration process is exactly the same as for
the Prisma Access Browser. Some of the policy rules contain different functionality
due to the restrictions in mobile browsers.
Mobile Access & Data Control
Mobile Devices support Access & Data Control rules with the
following exceptions:
- The Mobile Browser does not support the Set dialog text feature that permits you to customize your text for a particular feature.
- The Web Access section of the rule creation process does not support the following features:
- Permission request (a “Prompt” option) becomes a Block.
- Require MFA becomes a Block.
- Pick a Label is skipped.
- Login restrictions - Not supported and can be skipped.
- When contains - Not supported and can be skipped.
To see the policy rules that you can use for creating rules in the Prisma Access
Mobile Browser, open the policy page, select Data Control, and click
Mobile Browser.
For more information on the available policy rules, refer to the following
articles:
- File Download
The following File Download controls operate differently in the Prisma Access Mobile Browser:
- ∫Allow (Protected) - The Prisma Access Mobile Browser will block all downloads.
- Block - The Prisma Access Mobile Browser will block all downloads.
- Apply on - When applied on specific files the Prisma Access Mobile Browser will block all downloads.
- Prompt - Selecting any prompt will block downloads.
- File UploadThe following File Upload controls operate differently in the Prisma Access Mobile Browser:
- Allow - The Prisma Access Mobile Browser will allow all uploads.
- Allow protected files only between the rule’s web applications - The Prisma Access Mobile Browser will block all file uploads.
- Allow only nonprotected files – The Prisma Access Mobile Browser will block all file uploads.
- Block – The Prisma Access Mobile Browser will block all file uploads.
- Apply on: - Select one of the following options:
- Any file - The upload restrictions will apply to all files.
- Specific Files - The Prisma Access Mobile Browser
supports file specification only for the following
Microsoft web-apps:
- Teams
- Outlook
- OneDrive for Business
- SharePoint online For all other applications and URLs, the action will block file uploads for both blocking specific file uploads and allowing specific file uploads.Additionally, only File size and File type are supported. The upload restrictions will apply to files that meet the selected specifications (the rule can contain as many of these specifications as needed):
- File size - Set the size of the file.
- File types - set the that need to match this rule.
- File hash - The Prisma Access Mobile Browser will block all file uploads using File Hash.
- MIP label - The Prisma Access Mobile Browser will block all file uploads requiring an MIP label.
- Prompt - Selecting any prompt will block all downloads.
- Clipboard
The following Clipboard commands operate differently in the Prisma Access Mobile Browser.
- Cut & Paste Data out:
- Block (Permit only within the rule's web
applications) - The Prisma Access Mobile Browser
will block Copy and Paste Data out.
- Exclude URL address bar – Not supported in Prisma Access Mobile Browser. If selected, it will be skipped.
- Prompt - The Prisma Access Mobile Browser will treat this as Block. All Copy & Paste Data Out will be blocked.
- Block (Permit only within the rule's web
applications) - The Prisma Access Mobile Browser
will block Copy and Paste Data out.
- Copy & Paste Data in:
- Prompt - The Prisma Access Mobile Browser will treat this as Block. All Copy & Paste Data In will be blocked.
- Cut & Paste Data out:
- Print
The Print control can also be used to manage File Downloads by printing to a PDF.
- Screenshot
The following screenshot control operates differently in the Prisma Access Browser:
- Allow (Protected) – The Prisma Access Mobile Browser will block screen capture, screen recording, and screen sharing using video conference tools.
Mobile Browser Security
To see the policy rules that you can use for creating rules in the Prisma Access
Mobile Browser, open the policy page, select Browser Security, and click
Mobile Browser.
For more information on the available policy rules, refer to the following
articles:
Mobile Browser Customization
To see the policy rules that you can use for creating rules in the Prisma Access
Mobile Browser, open the policy page, select Browser Customization, and
click Mobile Browser.
For more information on the available policy rules, refer to the following
articles:
Set Prisma Access Mobile as the Default Browser for Intune-Managed Applications
Intune enables you to set a default browser for organization-managed
apps. You can apply this globally through App Protection policy rules, or
selectively for specific, critical applications. This is relevant for mobile
devices (iOS and Android), as they are often employee-owned. However, enforcing
a company browser as the default for all apps might raise employee concerns.
Enforcing the Prisma Access Mobile Browser for your Intune-managed apps
significantly enhances your organization's Data Security. You can safeguard
against phishing and identity theft by limiting how URLs are opened. You will be
minimizing the risk of exposure to malicious links by enforcing the use of the
Prisma Access Mobile Browser.
Furthermore, Intune’s clipboard control adds another layer of
protection. It prevents users from copying and pasting links into unmanaged
apps. This ensures that organizational data is always accessible through trusted
and controlled applications.
In essence, designating the Prisma Access Mobile Browser for Intune
apps mitigates the risks associated with phishing and other identity-based
attacks, along with data leak exposure.
To Enable Intune-Managed Applications
This requires an Intune Plan 1 license
Browse to the Intune admin Portal → App Protection policy rules
→ Select the policy you want to modify or create.
At the
Data Protection admin, select “Restrict web content transfer with
other apps,” and enter Unmanaged browser.
iOS Devices
In the Unmanaged browser
protocol field, enter pab://.
Android
Devices
In the Unmanaged Browser ID field, enter
com.talonsec.talon.
In the Unmanaged Browser
Name field, enter PA Browser.
.