Edit

Share via


Learn about Security Service Edge (SSE) coexistence with Microsoft and Palo Alto Networks

Microsoft and Palo Alto Networks SSE solutions can be used together in a unified environment. When used together, you harness a robust set of capabilities from both platforms to elevate your SASE journey. The synergy between these platforms enhances security and provides seamless connectivity.

This document contains steps to deploy these solutions side by side across several different access scenarios.

  1. Configuration 1: Microsoft Entra Private Access with Palo Alto Prisma Access for secure Internet Access

In this scenario Global Secure Access will handle private application traffic. Prisma Access will only capture Internet traffic.

  1. Configuration 2: Microsoft Entra Private Access with Palo Alto Prisma Access for Private Application and Internet Access

In this scenario both clients will handle traffic for separate private applications. Private applications in Microsoft Entra Private Access will be handled by Global Secure Access while private applications in Prisma Access service connections, or ZTNA connectors, will be accessed through GlobalProtect client. Internet traffic will be handled by Prisma Access.

  1. Configuration 3: Microsoft Entra Microsoft Access with Palo Alto Prisma Access for Private Application and Internet Access

In this scenario Global Secure Access will handle all Microsoft 365 traffic. Prisma Access will handle Private applications via service connection or ZTNA connectors. Internet traffic will be handled by Prisma Access.

  1. Configuration 4: Microsoft Entra Internet Access and Microsoft Entra Microsoft Access with Palo Alto Prisma Access for Private Application Access

In this scenario Global Secure Access will handle Internet and Microsoft 365 traffic. Prisma Access will only capture private application traffic via service connection or ZTNA connectors.

Note

The following configurations were tested for Palo Alto Prisma Access and managed with Strata Cloud Manager. Private application access was tested through Service Connections and ZTNA connectors. Connectivity to Prisma Access service was provided by GlobalProtect and tested with SSL and IPsec VPN configurations.

Prerequisites

To configure Microsoft and Palo Alto Prisma Access for a unified SASE solution, start by setting up Microsoft Entra Internet Access and Microsoft Entra Private Access. Next, configure Prisma Access for private application access by service connection or ZTNA connector. Finally, make sure to establish the required FQDN and IP bypasses to ensure smooth integration between the two platforms.

  • Set up Microsoft Entra Internet Access and Microsoft Entra Private Access. These products make up the Global Secure Access solution.
  • Set up Palo Alto Prisma Access for Private Access and Internet Access
  • Configure the Global Secure Access FQDN and IP bypasses

Microsoft Global Secure Access

To set up Global Secure Access and test all scenarios in this documentation you will need to perform the following.

  • Enable and disable different Global Secure Access traffic forwarding profiles for your Microsoft Entra tenant. For more information about enabling and disabling profiles, see Global Secure Access traffic forwarding profiles.

  • Install and configure the Microsoft Entra private network connector. To learn how to install and configure the connector, see How to configure connectors.

Note

Private Network Connectors are required for Microsoft Entra Private Access applications.

Palo Alto Prisma Access

To integrate Palo Alto Prisma Access with Microsoft Global Secure Access, make sure you complete the following prerequisites. These steps ensure smooth integration, better traffic management, and improved security.

Tunnel Settings:

  1. In the Strata Cloud Manager portal, go to Workflows > Prisma Access Setup > GlobalProtect > GlobalProtect App > Tunnel Settings.
  2. In the Split Tunneling section, exclude traffic by adding the domain and routes: *.globalsecureaccess.microsoft.com150.171.19.0/24150.171.20.0/2413.107.232.0/2413.107.233.0/24150.171.15.0/24150.171.18.0/24151.206.0.0/166.6.0.0/16.

App Settings:

  1. In the Strata Cloud Manager portal, go to Workflows > Prisma Access Setup > GlobalProtect > GlobalProtect App > App Settings
  2. Scroll to App Configuration > Show Advanced Options > DNS and uncheck the box for Resolve All FQDNs Using DNS Servers Assigned by the Tunnel (Windows Only)

    Note

    The setting "Resolve All FQDNs Using DNS Servers Assigned by the Tunnel (Windows Only)" should be disabled when using Microsoft Entra Private DNS (Configurations 1 and 2). During testing, this setting was enabled (checked) for Configurations 3 and 4.

  3. Navigate to Workflows > Prisma Access Setup > GlobalProtect > GlobalProtect App. Select Push Config and select Push on the top right side of your screen.
  4. Verify that the configuration pushed to the GlobalProtect client. Navigate to Manage > Operations > Push Status.
  5. Install the Palo Alto Networks GlobalProtect client. For more information on installing the Palo Alto Networks GlobalProtect client, for Windows see GlobalProtect App for Windows. For macOS see, GlobalProtect App for macOS. To set up the GlobalProtect client there are a lot of options like tying in Microsoft Entra ID to create your accounts. To learn more about the options, see Microsoft Entra single sign-on (SSO) integration with Palo Alto Networks - GlobalProtect. For the most basic setup, add a local user to the GlobalProtect from Palo Alto Networks’ Strata Cloud Manager.
  6. Browse to Manage > Configuration > NGFW and Prisma Access.
  7. Select Configuration Scope > GlobalProtect and then select Identity Services > Local Users & Groups > Local Users. Add a user and password for testing.
  8. After the client is installed, users enter the portal address and their credentials.
  9. After users sign in, the connection icon turns blue, and clicking on shows it in a connected state.

    Note

    In Configuration 4, if you face issues connecting with GlobalProtect using local users, try setting up Microsoft Entra SSO.

Configuration 1: Microsoft Entra Private Access with Palo Alto Prisma Access for secure Internet Access

In this scenario Global Secure Access will handle private application traffic. Prisma Access will only capture Internet traffic.

Microsoft Entra Private Access configuration

For this scenario you will need to do the following.

Palo Alto Prisma Access configuration

For this scenario you will need to perform the following in the Palo Alto Strata Cloud Manager portal.

After both clients are installed and running side by side and configurations from admin portals are complete, go to the system tray to check that Global Secure Access and GlobalProtect clients are enabled.

Verify configuration for Global Secure Access client.

  1. Right click on the Global Secure Access client > Advanced Diagnostics > Forwarding Profile and verify that Private Access and Private DNS rules are applied to this client.
  2. Navigate to Advanced Diagnostics > Health Check and ensure no checks are failing.

Note

For information about troubleshooting health check failures, see Troubleshoot the Global Secure Access client: Health check - Global Secure Access | Microsoft Learn.

Test traffic flow

  1. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. Select the Traffic tab and select Start collecting.
  2. Access these websites from the browsers: salesforce.comInstagram.com, yelp.com.
  3. In the system tray, right-click Global Secure Access Client and select Advanced Diagnostics > Traffic tab.
  4. Scroll to observe that the Global Secure Access client isn't capturing traffic from these websites
  5. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs. Validate traffic related to these sites is missing from the Global Secure Access traffic logs.
  6. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer.
  7. Validate traffic related to these sites is present in the Prisma Access logs.
  8. Access your private application set up in Microsoft Entra Private Access. For example, access a File Share via Server Message Block (SMB).
  9. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs.
  10. Validate traffic related to the File Share is captured in the Global Secure Access traffic logs.
  11. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer. Validate traffic related to the private application isn’t present in the logs.
  12. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. In the Traffic dialog box, select Stop collecting.
  13. Scroll to confirm the Global Secure Access client handled only private application traffic.

Configuration 2: Microsoft Entra Private Access with Palo Alto Prisma Access for Private Application and Internet Access

In this scenario both clients will handle traffic for separate private applications. Private applications in Microsoft Entra Private Access will be handled by Global Secure Access while private applications in Prisma Access service connections, or ZTNA connectors, will be accessed through GlobalProtect client. Internet traffic will be handled by Prisma Access.

Microsoft Entra Private Access configuration

For this scenario you will need to:

Palo Alto Networks configuration

For this scenario you will need to perform the following in the Palo Alto Strata Cloud Manager portal.

After both clients are installed and running side by side and configurations from admin portals are complete, go to the system tray to check that Global Secure Access and GlobalProtect clients are enabled.

Verify configuration for Global Secure Access client.

  1. Right click on the Global Secure Access client > Advanced Diagnostics > Forwarding Profile and verify that Private Access and Private DNS rules are applied to this client.
  2. Navigate to Advanced Diagnostics > Health Check and ensure no checks are failing.

Note

For information about troubleshooting health check failures, see Troubleshoot the Global Secure Access client: Health check - Global Secure Access | Microsoft Learn.

Test traffic flow

  1. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. Select the Traffic tab and select Start collecting.
  2. Access these websites from the browsers: salesforce.comInstagram.com, yelp.com.
  3. In the system tray, right-click Global Secure Access Client and select Advanced Diagnostics > Traffic tab.
  4. Scroll to observe that the Global Secure Access client isn't capturing traffic from these websites.
  5. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs. Validate traffic related to these sites is missing from the Global Secure Access traffic logs.
  6. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer.
  7. Validate traffic related to these sites is present in the Prisma Access logs.
  8. Access your private application set up in Microsoft Entra Private Access. For example, access a File Share via Server Message Block (SMB).
  9. Access your private application set up in Prisma Access through a service connection or ZTNA connector. For example, open an RDP session to a private server.
  10. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs.
  11. Validate traffic related to the SMB file share private app is captured and that traffic related to the RDP session isn’t captured in the Global Secure Access traffic logs.
  12. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer. Validate traffic related to the private RDP session is present and that traffic related to the SMB file share isn’t in the logs.
  13. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. In the network traffic dialog box, select Stop collecting.
  14. Scroll to confirm the Global Secure Access client handled private application traffic for the SMB file share and didn't handle the RDP session traffic.

Configuration 3: Microsoft Entra Microsoft Access with Palo Alto Prisma Access for Private Application and Internet Access

In this scenario Global Secure Access will handle all Microsoft 365 traffic. Prisma Access will handle Private applications via service connection or ZTNA connectors and Internet traffic.

Microsoft Entra Microsoft Access configuration

For this scenario you will need to:

Palo Alto Networks configuration

For this scenario you will need to perform the following in the Palo Alto Strata Cloud Manager portal.

Note

For this configuration, enable Resolve All FQDNs Using DNS Servers Assigned by the Tunnel (Windows Only) in the App Settings.

After both clients are installed and running side by side and configurations from admin portals are complete, go to the system tray to check that Global Secure Access and GlobalProtect clients are enabled.

Verify configuration for Global Secure Access client.

  1. Right click on the Global Secure Access client > Advanced Diagnostics > Forwarding Profile and verify that Microsoft 365 rules are applied to this client.
  2. Navigate to Advanced Diagnostics > Health Check and ensure no checks are failing.

Note

For information about troubleshooting health check failures, see Troubleshoot the Global Secure Access client: Health check - Global Secure Access | Microsoft Learn.

Test traffic flow

  1. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. Select the Traffic tab and select Start collecting.
  2. Access these websites from the browsers: salesforce.comInstagram.com, yelp.com.
  3. In the system tray, right-click Global Secure Access Client and select Advanced Diagnostics > Traffic tab.
  4. Scroll to observe that the Global Secure Access client isn't capturing traffic from these websites.
  5. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs. Validate traffic related to these sites is missing from the Global Secure Access traffic logs.
  6. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer.
  7. Validate traffic related to these sites is present in the Prisma Access logs.
  8. Access your private application set up in Prisma Access through a service connection or ZTNA connector. For example, open an RDP session to a private server.
  9. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs.
  10. Validate traffic related to the RDP session isn’t in the Global Secure Access traffic logs
  11. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer. Validate traffic related to the RDP session is present in the Prisma Access logs.
  12. Access Outlook Online (outlook.comoutlook.office.comoutlook.office365.com), SharePoint Online (<yourtenantdomain>.sharepoint.com).
  13. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. In the Traffic dialog box, select Stop collecting.
  14. Scroll to confirm the Global Secure Access client handled only Microsoft 365 traffic.
  15. You can also validate that the traffic is captured in the Global Secure Access traffic logs. In the Microsoft Entra admin center, navigate to Global Secure Access > Monitor > Traffic logs.
  16. Validate traffic related to Outlook Online and SharePoint Online is missing from Prisma Access logs in Strata Cloud Manager Incidents & Alerts > Log Viewer.

Configuration 4: Microsoft Entra Internet Access and Microsoft Entra Microsoft Access with Palo Alto Prisma Access for Private Application Access

In this scenario Global Secure Access will handle Internet and Microsoft traffic. Prisma Access will only capture private application traffic via service connection or ZTNA connectors.

Microsoft Entra Internet and Microsoft Access configuration

For this scenario you will need to do the following.

Add a custom bypass for Prisma Access in Global Secure Access:

  1. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Connect > Traffic forwarding > Internet access profile > Under Internet access policies > Select “View”.
  2. Expand Custom Bypass > Select Add rule.
  3. Leave destination type FQDN and in Destination enter *.gpcloudservice.com.
  4. Select Save.

Palo Alto Networks configuration

For this scenario you will need to perform the following in the Palo Alto Strata Cloud Manager portal.

Note

For this configuration, enable Resolve All FQDNs Using DNS Servers Assigned by the Tunnel (Windows Only) in the App Settings.

After both clients are installed and running side by side and configurations from admin portals are complete, go to the system tray to check that Global Secure Access and GlobalProtect clients are enabled.

Verify configuration for Global Secure Access client.

  1. Right click on the Global Secure Access client > Advanced Diagnostics > Forwarding Profile and verify that Microsoft 365 and Internet Access rules are applied to this client.
  2. Navigate to Advanced Diagnostics > Health Check and ensure no checks are failing.

Note

For information about troubleshooting health check failures, see Troubleshoot the Global Secure Access client: Health check - Global Secure Access | Microsoft Learn.

Test traffic flow

  1. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. Select the Traffic tab and select Start collecting.
  2. Access these websites from the browser: bing.comsalesforce.comInstagram.com, Outlook Online (outlook.comoutlook.office.comoutlook.office365.com), SharePoint Online (<yourtenantdomain>.sharepoint.com).
  3. Sign in to Microsoft Entra admin center and browse to Global Secure Access > Monitor > Traffic logs. Validate traffic related to these sites is captured in the Global Secure Access traffic logs.
  4. Access your private application set up in Prisma Access through a service connection or ZTNA connector. For example, open an RDP session to a private server.
  5. Sign in to Palo Alto Networks’ Strata Cloud Manager and browse to Incidents & Alerts > Log Viewer. Validate traffic related to the RDP session is present and that traffic related to Microsoft 365 and Internet Traffic such as Instagram.com, Outlook Online, and SharePoint Online is missing from the Prisma Access logs.
  6. In the system tray, right-click Global Secure Access Client and then select Advanced Diagnostics. In the network traffic dialog box, select Stop collecting.
  7. Scroll to observe that the Global Secure Access client isn't capturing traffic from the private application. Also, observe that the Global Secure Access client is capturing traffic for Microsoft 365 and other internet traffic.

Next steps

-What is Global Secure Access?