Associate the Gen-AI-Best-Practice snippet to implement out of the box best practices
for GenAI app adoption recommended by Palo Alto Networks.
Where Can I Use This?
What Do I Need?
NGFW (Managed by Panorama or Strata Cloud Manager)
Prisma Access (Managed by Panorama or Strata Cloud Manager)
One of the following:
AI Access Security license
CASB-PA license
CASB-X license
ActivatingAI Access Security gives you access to the predefined
Gen-AI-Best-Practicesnippet. This snippet gives your
organization a starting point to implement Security policy rules that use best
practices for GenAI app adoption recommended by Palo Alto Networks. This snippet
allows you to quickly allow access to Sanctioned GenAI apps and blocks a wide
range of potentially risky GenAI apps by default. This helps your organization
maintain control over GenAI app usage while still enabling productivity-enhancing
tools. AI Access Security associates the
Gen-AI-Best-Practice snippet with the default
Global configuration folder by default.
Review the two Security policy rules associated with the predefined
Gen-AI-Best-Practice snippet for details about what
each includes.
Expand all
Collapse all
Sanctioned GenAI Access
The Sanctioned GenAI Access Security policy rule
allows access to all GenAI apps classified as a Sanctioned app. The
Sanctioned GenAI Access policy rule is part
of the pre-rule rulebase so policy rule
evaluation takes precedence over deployment-specific policy rules and the
post-rule rulebase.
Location—ManageConfigurationNGFW and Prisma AccessSecurity ServicesSecurity PolicyInternet Security.
Allows access to Sanctioned GenAI apps.
Disabled by default. You need to manually enable this Security policy
rule.
This application filter groups GenAI apps based on their
classification to dynamically enforce Security policy rules without
the need to modify the Security policy rule.
Applies to any source and destination address and user.
Default GenAI App Access
The Sanctioned GenAI Access Security policy rule
blocks access to all GenAI apps classified not classified as a Sanctioned or Tolerated app. The
Default GenAI App Access policy rule is
part of the post-rule rulebase so policy rule
evaluation occurs after deployment-specific policy rules and the pre-rule
rulebase.
Location—ManageConfigurationNGFW and Prisma AccessSecurity ServicesSecurity PolicyInternet Security.
Disabled by default. You need to manually enable this Security policy
rule.
Blocks access to Tolerated or Unsanctioned GenAI apps, or to any GenAI
not explicitly allowed by a Security policy rule evaluated before the
Default GenAI App Access policy rule in
the policy rulebase hierarchy.
The application filter groups GenAI apps based on the
GenAI Apps classification tag to
dynamically enforce Security policy rules without the need to modify
the Security policy rule. All traffic from GenAI apps have this
classification tag applied by default.
Applies to any source and destination address and user.
Select ManageConfigurationNGFW and Prisma AccessSecurity ServicesSecurity PolicyInternet Security.
Toggle the setting in the State column for both the
Sanctioned GenAI Access and
Default GenAI App Access policy rules to
enable.
(Optional) Create and apply Security Profiles to the
Sanctioned GenAI Access policy rule.
Security Profiles allow you to apply additional security settings to allowed
traffic to strengthen your security posture. For example, you can associate
a DLP rule with the
Sanctioned GenAI Access policy rule to
prevent exfiltration of sensitive data to Sanctioned GenAI apps.
Alternatively, you can use the AI Access SecurityRecommendations to enable your
network security admins to quickly address gaps and strengthen your security
posture when adopting GenAI apps.