App-ID Features
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
App-ID Features
What new App-ID features are in PAN-OS 11.2?
The following section describes new App-ID features introduced in PAN-OS 11.2.
User Session Tracking for SaaS Security Inline
February 2025
|
For certain discovered applications, SaaS Security Inline can submit policy recommendations at the tenant
level. For a subset of these applications, we now support even greater
granularity through session tracking. We introduced session tracking to enable SaaS
Security Inline to create policy recommendations for individual user accounts on an
application tenant. This capability enables you to allow some application traffic
for a tenant, while blocking traffic from specific user accounts on that tenant. For
example, for a trusted vendor, you might allow traffic only for your organization's
accounts for a particular application, while blocking traffic for the vendor's
accounts or personal accounts for the application.
Session tracking is available only if your license includes SaaS Security Inline, and
you must explicitly enable session tracking in PAN-OS.
After you enable session tracking, PAN-OS logs additional user and tenant information
to Strata Logging Service. This feature also introduces new custom objects types
(SaaS Users and SaaS Tenants) for identifying user accounts and tenants in a policy
rule.
Within 24 hours after the session tracking information is available in Strata Logging
Service, SaaS Security Inline can detect the individual user accounts for the
supported applications. SaaS Security Inline administrators can then submit policy
recommendations that affect only certain user accounts for these applications. When
you import the policy recommendation on the firewall, PAN-OS creates the policy rule
for the recommendation, including the custom SaaS Users and SaaS Tenant objects.
These custom objects are referenced by the policy rule. For information on the
applications that we support for session tracking, refer to the information about
creating SaaS policy rule recommendations
in the SaaS Inline documentation.
Because SaaS Security Inline is the only consumer of the session tracking
information, and because you might not need to block traffic at the granularity of
user accounts, session tracking is disabled by default. You can enable session
tracking from the ACE settings page (DEVICESetupACE).
Additional HTTP Header Logging for More Tenant-Level Detection
July 2024
|
For certain discovered applications, SaaS Security Inline can detect the specific
application tenants that users are accessing. SaaS Security Inline displays these
tenant details, and you can submit policy rule recommendations at the tenant
level. This tenant-level detection and control is available only for
select applications.
To support tenant-level detection and control for more applications, PAN-OS 11.2.1
introduces a new setting to enable additional HTTP header logging. When additional
HTTP header logging is enabled, the firewall logs more information about the
applications to Strata Logging Service. This additional information enables SaaS
Security Inline to detect the individual application tenants for the following
applications:
- Microsoft Outlook
- Microsoft OneNote
- Dropbox
- MS Powerapps
- Microsoft Teams
- Windows Azure
Because SaaS Security Inline is the only consumer of this information, and because
you might not require tenant-level policies for these applications, the additional
header logging is disabled by default. To enable the additional HTTP header logging
on the firewall:
- Select DEVICESetupACE.
- Under SaaS Inline Settings, Enable Additional HTTP Header Logging.
Within 24 hours after the additional logs are available in Strata Logging Service,
SaaS Security Inline will be able to detect the individual tenants for the
applications, and you will be able to submit tenant-level policy recommendations in
SaaS Security Inline for the applications.
Explicit Proxy Support for Advanced Services
September 2024
|
Palo Alto Networks now provides support for Advanced cloud-based features (including,
but not limited to Precision AI™ optimized features such as Advanced WildFire: Inline Cloud Analysis,
Advanced Threat Prevention: Inline Cloud
Analysis, Inline Deep Learning Analysis for Advanced URL
Filtering; as well as App-ID Cloud Engine, and Enterprise DLP) when using an explicit proxy as part of
a customer's network security infrastructure. Previously, access to various
components of advanced security subscriptions required direct internet connectivity,
preventing users from maximizing the feature set of their advanced cloud services
when internet traffic is handled by an explicit proxy server, which could leave them
vulnerable to certain security threats. When Explicit Proxy Support for Advanced
Services is enabled, the firewall initiates and completes a proxy handshake
and authentication procedures to establish connection to the specified proxy server,
which subsequently forwards traffic to the Palo Alto Networks Advanced cloud service
servers via the proxy.
For more information about enabling explicit proxy support for advanced services,
refer to the configuration documentation for enabling the specific advanced
subscription service.