docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases
1 Users
0 Comments
1 Highlights
0 Notes
Tags
Top Highlights
New and modified App-IDs are delivered to the firewall as part of Applications and Threat Content Updates. While new and modified App-IDs enable the firewall to enforce your security policy with ever-increasing precision, changes in security policy enforcement that can occur when a content update release is installed can impact application availability. For this reason, you will need to think about how to best deploy content updates so that you can get the latest threat prevention as it’s made available, and adjust your security policy to best leverage new and modified App-IDs. To aid in managing new and modified App-IDs you can take advantage of application tags provided in the content updates. These tags group applications with common attributes so you can use a single policy to manage applications without requiring you to review or update policy whenever new applications are added. Use the following procedures to use application tags: Apply Tags to an Application Filter Create Custom Application Tags For applications not tagged, the following options enable you to assess the impact of new App-IDs on existing policy enforcement, disable (and enable) App-IDs, and seamlessly update policy rules to secure and enforce newly-identified applications: Workflow to Best Incorporate New and Modified App-IDs See the New and Modified App-IDs in a Content Release See How New and Modified App-IDs Impact Your Security Policy Ensure Critical New App-IDs are Allowed Monitor New App-IDs Disable and Enable App-IDs
Glasp is a social web highlighter that people can highlight and organize quotes and thoughts from the web, and access other like-minded people’s learning.