App-ID Features
Focus
Focus

App-ID Features

Table of Contents

App-ID Features

What new App-ID features are in PAN-OS 11.2?
The following section describes new App-ID features introduced in PAN-OS 11.2.

User Session Tracking for SaaS Security Inline

February 2025
  • Introduced in PAN-OS 11.2.5.
Tenant-level detection and control within SaaS Security Inline is limited to only select applications. For these applications, SaaS Security Inline can detect the specific application tenants that users are accessing. SaaS Security Inline displays these tenant details, and you can submit policy rule recommendations at the tenant level.
To support tenant-level detection and control for more applications, we now support even greater granularity through session tracking. We introduced session tracking to enable SaaS Security Inline to create policy recommendations for individual user accounts on an application tenant. This capability enables you to allow some application traffic for a tenant, while blocking traffic from specific user accounts on that tenant. For example, for a trusted vendor, you might allow traffic only for your organization's accounts for a particular application, while blocking traffic for the vendor's accounts or personal accounts for the application.
Session tracking is available only if your license includes SaaS Security Inline, and you must explicitly enable session tracking in PAN-OS®.
After you enable session tracking, PAN-OS logs additional user and tenant information to Strata Logging Service. This feature also introduces new custom objects types (SaaS Users and SaaS Tenants) for identifying user accounts and tenants in a policy rule.
Because SaaS Security Inline is the only consumer of the session tracking information, and because you might not need to block traffic at the granularity of user accounts, session tracking is disabled by default. Administrators can easily enable this setting, as described in the instructions for creating SaaS policy rule recommendations.

Additional HTTP Header Logging for More Tenant-Level Detection

July 2024
  • Introduced in PAN-OS 11.2.1.
Tenant-level detection and control within SaaS Security Inline is limited to only select applications. For these applications, SaaS Security Inline can detect the specific application tenants that users are accessing. SaaS Security Inline displays these tenant details, and you can submit policy rule recommendations at the tenant level.
To support tenant-level detection and control for more applications, PAN-OS® 11.2.1 introduces a new setting to enable additional HTTP header logging. When additional HTTP header logging is enabled, the firewall logs more information about the applications to Strata Logging Service. This additional information enables SaaS Security Inline to detect the individual application tenants for the following applications:
  • Microsoft Outlook
  • Microsoft OneNote
  • Dropbox
  • MS Powerapps
  • Microsoft Teams
  • Windows Azure
Because SaaS Security Inline is the only consumer of this information, and because you might not require tenant-level policies for these applications, the additional header logging is disabled by default. Administrators can easily enable this setting, as described in submitting tenant-level policy recommendations in SaaS Security Inline. Within 24 hours after the additional logs are available in Strata Logging Service, SaaS Security Inline will be able to detect the individual tenants for these applications, allowing you to submit tenant-level policy recommendations.

Explicit Proxy Support for Advanced Services

September 2024
  • Introduced in PAN-OS 11.2.3.
Many organizations rely on explicit proxy servers to filter and control outbound internet traffic. Previously, this setup created a security gap: users could not fully enable core components of Palo Alto Networks Advanced cloud service subscriptions—including Advanced WildFire®: Inline Cloud Analysis, Advanced Threat Prevention: Inline Cloud Analysis, Inline Deep Learning Analysis for Advanced URL Filtering, App-ID™ Cloud Engine, and Enterprise DLP—because these features required direct internet connectivity. This limitation meant users with explicit proxy servers were unable to maximize their security posture across their entire environment.Explicit Proxy Support for Advanced Cloud Service Products resolves this challenge. This new feature allows the firewall to successfully establish connectivity to Palo Alto Networks Advanced cloud services through an explicit proxy server. You can now ensure consistent security enforcement and threat analysis across all your web traffic, regardless of how you route outbound connectivity, thereby maintaining full feature functionality and strengthening your overall network security. To enable explicit proxy support for advanced services, refer to the configuration documentation for the specific advanced subscription service.