Integrate Prisma Access with Microsoft Defender for Cloud Apps
Focus
Focus
Prisma Access

Integrate Prisma Access with Microsoft Defender for Cloud Apps

Table of Contents

Integrate Prisma Access with Microsoft Defender for Cloud Apps

Learn how to integrate Prisma Access with Microsoft Defender for Cloud Apps.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
Integrate Prisma Access with Microsoft Defender for Cloud Apps to sync unsanctioned applications and block them inline using Prisma Access automatically. After you integrate Microsoft Defender for Cloud Apps with Prisma Access, Prisma Access creates a block Security policy for URLs that are blocked in Microsoft Defender for Cloud Apps. You can view the list of unsanctioned applications after configuring the integration settings. You can sync up to 25,000 applications in this integration.
Complete the following steps to integrate Prisma Access with Microsoft Defender for Cloud Apps:
  1. Enable this functionality.
    Contact your Palo Alto Networks account representative or partner, who will submit a request.
  2. In Strata Cloud Manager, select ManageConfigurationNGFW and Prisma Access.
  3. Set the Configuration Scope to Global, and select Global SettingsSaaS Application Endpoints.
  4. Navigate to MS Defender for Cloud Apps.
  5. Edit the Microsoft Defender for Cloud Apps settings.
    1. Enter details in all the required fields.
      View the Microsoft Defender for Cloud Apps overview to obtain the required details.
    2. Check the Connectivity.
    3. Save the settings after the connection is a success.
      You can save the settings only after the connection is a success. The integration automatically creates a Security policy and a custom URL category to block the unsanctioned apps.
  6. View Unsanctioned Apps.
    You can view up to 25,000 unsanctioned applications. The latest list of unsanctioned apps appears every time you View Unsanctioned Apps.
    If the list does not appear, reconfigure the integration settings, and check the connectivity again as mentioned in step 5.
  7. Enable the Security policy.
    Prisma Access creates a Security policy after you configure the integration.
    1. Select Security ServicesSecurity Policy.
    2. Set the Configuration Scope to Prisma Access.
    3. Confirm the Prisma Access web Security policy rules and the pre-rule Security policy rules.
      A Block Unsanctioned MS Defender Apps web Security policy and pre-rule Security policy, with the same name, are created.
      Prisma Access uses these rules to block the URLs of unsanctioned apps.
    4. Select the Security policy rules and Enable them.
    5. (Optional) Create a Security policy if required and enable it.
      Select the Unsanctioned MS Defender Apps URL category.
    6. Push the changes.
  8. (Optional) Customize the Microsoft Defender for Cloud Apps integration settings.
    1. Click the settings and select Customize.
    2. Edit the settings.
    3. Check the Connectivity Again.
    4. Save the changes.
  9. (Optional) Delete the integration.
    1. Click the settings and select Delete Integration.
    2. Confirm Delete Integration.
    3. Delete the Security policy rules created to block the URLs of unsanctioned apps.
      If you reconfigure the integration, Prisma Access does not create default Security policy rules. However, you can select the Unsanctioned MS Defender Apps URL category for the Security policy rules you create.
    4. Push the changes.