What this book covers
Chapter 1, Designing and Planning Prisma Access, explains how to prepare before deploying Prisma Access, which components to consider, and considerations that need to be made before deploying.
Chapter 2, Activating Prisma Access, reviews the process of activating the Prisma Access tenant and activating Cortex Data Lake.
Chapter 3, Setting up Service Infrastructure, covers the steps needed to activate the service infrastructure, the backbone of Prisma Access
Chapter 4, Deploying Service Connections, discusses service connections and how to configure them.
Chapter 5, Configuring Remote Network SPNs, covers the Remote Network Security Processing Nodes, what they are used for, and how to configure them.
Chapter 6, Configuring Mobile User SPNs, explains Mobile User Security Processing Nodes, how to deploy them in different locations, and how to set up GlobalProtect.
Chapter 7, Securing Web Gateway, discusses the explicit proxy configuration as an alternative to MU-SPN.
Chapter 8, Setting up Your Security Policy, explains how to set up security rules for all our Security Processing Nodes.
Chapter 9, User Identification and Cloud Identity Engine, discusses user identification and how group mapping via Cloud Identity Engine can be done.
Chapter 10, Advanced Configurations and Insights, covers Insights, Cortex Data Lake, and Autonomous Digital Experience Management.
Chapter 11, ZTNA Connector, discusses ZTNA connector, an alternative to SC-CAN that makes private applications available to users.