Investigating - We have identified the cause of missing user data in the Activity Insights - Users dashboard and are working on mitigation to restore full visibility.
Oct 28, 2025 - 00:07 UTC
Update - We have completed Dataplane upgrade of canary location: "China North West", please verify connectivity and functionality and open a support case if you run into issues.
Oct 24, 2025 - 21:48 UTC
Identified - To ensure seamless service and prevent potential disruptions caused by enabled TLS 1.3 sessions, as well as to resolve known slow packet buffer leaks, we will be upgrading all Prisma Access environments to a new version that includes critical fixes and optimizations.
Canary Region upgrade on Oct 24th: China North West Full Region upgrade on Oct 31st: China North
Thank you for your understanding and cooperation during this time and if you wish to change the canary region or have further questions then please reach out to your Palo Alto Networks account team, the customer success team, or the support team.
Oct 06, 2025 - 07:35 UTC
If your network is currently set up only to allow traffic to the older Intune IP addresses, your devices will no longer be able to connect to Intune. To prevent this, update your firewall rules with the new addresses before December 2, 2025.
Which Palo Alto Networks Products are affected?
The changes to the IP address range of the Microsoft Intune cloud service will impact Palo Alto Networks products and services that use allow/deny network access control policies using Intune IP addresses:
Hardware and software NGFWs (PA-Series hardware, VM-Series, and CN-Series) Prisma Access
Update -
We will be undergoing scheduled maintenance during this time.
Oct 22, 2025 - 01:44 UTC
Scheduled -
Palo Alto Networks continually works to enhance its services. As part of a scheduled maintenance activity, PANW Engineering will roll out code changes to enhance RBI services. This scheduled maintenance activity is on Friday, 31st October, from 4:30 PM UTC to 6:30 PM UTC. Customers using the RBI service may witness degraded performance during the maintenance window. This impact will be limited to RBI users. We apologize for the inconvenience, and the Engineering and SRE teams are working diligently to ensure that the services are healthy and functional. Please reach out to the support team or your customer success representatives if you have any questions.
Oct 08, 2025 - 17:33 UTC
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted. Posted on
Oct 15, 2025 - 00:23 UTC
Due to a critical security vulnerability discovered in Redis / ElastiCache, we need to update the service to a patched version to ensure your environment remains secure and protected. Posted on
Oct 29, 2025 - 08:45 UTC
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted. Posted on
Jun 06, 2025 - 02:42 UTC
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted. Posted on
Jun 06, 2025 - 00:51 UTC
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted. Posted on
Jul 07, 2025 - 23:13 UTC
Past Incidents
Oct 30, 2025
No incidents reported today.
Oct 29, 2025
No incidents reported.
Oct 28, 2025
Unresolved incident: [CA, FR, ID Prod] Data Gaps Observed on Activity Insights – Users Dashboard.
Completed -
The scheduled maintenance has been completed.
Oct 26, 11:23 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Oct 26, 09:23 UTC
Scheduled -
Migration of recordings db from services to evidences cluster. services recordings-ingest evidence-api recordings-finalizer will be down during the migration.
Oct 22, 10:28 UTC
Completed -
The scheduled maintenance has been completed.
Oct 26, 08:28 UTC
Verifying -
Verification is currently underway for the maintenance items.
Oct 26, 08:22 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Oct 26, 07:58 UTC
Scheduled -
Due to a critical security vulnerability discovered in Redis/ElastiCache, we need to update the service to a patched version to ensure your environment remains secure and protected.
Oct 21, 09:00 UTC
Completed -
The scheduled maintenance has been completed.
Oct 25, 06:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Oct 24, 22:00 UTC
Scheduled -
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted.
Jul 7, 23:13 UTC
Oct 24, 2025
Unresolved incident: Prisma Access (China): Maintenance Dataplane Upgrade scheduled on Oct 24th (Canary) & Oct 31st (Full).
Resolved -
This incident has been resolved. We apologize for any inconvenience.
Oct 20, 12:29 UTC
Monitoring -
Prisma Access is currently experiencing an issue on mobile users gateway auto-scaling and new onboarding. The issue was caused due to a service disruption experienced by a cloud provider Prisma Access depends on. The underlying issue has been addressed and we are monitoring Prisma Access.
Customer Impact Some mobile users may experience unstable connectivity to Prisma Access due to auto-scaling failures. This degradation may impact new onboarding. The data plane traffic across the existing instances is NOT affected.
Workaround Users can try connecting to other regions.
Oct 20, 09:56 UTC
Resolved -
This incident has been resolved.
Oct 20, 09:58 UTC
Update -
We are continuing to monitor for any further issues.
Oct 20, 09:44 UTC
Monitoring -
Following an update from AWS indicating that their service availability issue in the us-east-1 region is in recovery, our internal monitoring confirms that all affected PAB services are also recovering. We expect any residual impact for users to be fully resolved shortly, and most users should now be able to log in and access all services normally. Our engineering teams will continue to monitor the service health closely until we can confirm full restoration. We will provide a final update once this incident is fully resolved.
Oct 20, 09:41 UTC
Update -
We are continuing to monitor the service event impacting the Prisma Access Browser (PAB) in the US region. Our latest investigation indicates that the impact is lower than initially anticipated, and we have confirmed that a majority of users are successfully able to log in, as well as access web and private applications. Our engineering teams continue to actively monitor the service health and the underlying AWS issue. We will provide a further update as more information becomes available or when the incident is fully resolved.
Oct 20, 09:11 UTC
Update -
A critical service disruption has been detected for the Prisma Access Browser (PAB), specifically impacting in the US region. The incident appears to be primarily caused by an AWS service availability issue in the us-east-1 region, leading to significant challenges in token minting and authentication processes.
The service degradation is causing potential access restrictions for users, particularly affecting new users or those who haven't been logged in for over 4 days. Specifically, users may experience difficulties accessing private applications, IDP enforcement, and other related services. Logged-in users are currently less impacted, but new authentication attempts are constrained.
Oct 20, 08:35 UTC
Investigating -
We are currently investigating this issue.
Oct 20, 08:32 UTC
Completed -
The scheduled maintenance has been completed.
Oct 18, 07:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Oct 17, 23:00 UTC
Scheduled -
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted.
Jun 6, 00:46 UTC
Completed -
The scheduled maintenance has been completed.
Oct 18, 00:00 UTC
In progress -
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Oct 17, 16:00 UTC
Scheduled -
Prisma Access team will be performing a scheduled maintenance on the infrastructure. There will not be any impact to the customers network infrastructure. The commits may be impacted.
Jun 6, 02:41 UTC
Resolved -
Version 141.19.4.108 is now available.
Oct 17, 09:11 UTC
Identified -
This incident affects a specific subset of macOS users. Policy enforcement may fail if the sign-in rules are configured with a Device Group that has the "system integrity" attribute enabled. macOS Users without a sign-in rule with the "system integrity" attribute are unaffected.
Impact Users under this specific rule enforcement condition may be impacted, resulting in the failure of a specific policy being enforced.
Affected Version - 141.19.3.108
Resolution The permanent fix is available in version 141.19.4.108. To fully resolve the issue, customers may downgrade to previous browser version (141.12.5.66) or update to version 141.19.4.108.
Workaround (Immediate Mitigation) Administrators may disable the "system integrity" attribute on the relevant Device Group.
Oct 17, 08:24 UTC
Resolved -
This incident has been resolved.
Oct 17, 04:51 UTC
Monitoring -
A fix has been implemented and we are monitoring the results.
Oct 17, 04:00 UTC
Identified -
The issue has been identified and a fix is being implemented.
Oct 17, 03:41 UTC
Investigating -
Palo Alto Networks' SDWAN engineering team is investigating stats call failures in the Qatar/Indonesia/Korea/Taiwan regions. As progress is made toward resolution, this page will be updated. We will share the next update by 04:30 am UTC
Oct 17, 03:26 UTC
Resolved -
This incident has been resolved.
Oct 16, 16:01 UTC
Monitoring -
The issue has been addressed, we continue to monitor
Oct 16, 15:45 UTC
Identified -
The issue has been identified and the team has applied a fix
Oct 16, 15:41 UTC
Investigating -
We are currently investigating a degraded login performance. Users may fail to log in and may require more than one attempt to log into the system in the US region Logged in users should be able to continue working normally
Oct 16, 15:36 UTC