Disable or Enable App-IDs
Disable new App-IDs included in a content release to immediately benefit from protection against the latest threats while continuing to have the flexibility to later enable App-IDs after preparing necessary policy updates. You can disable all App-IDs introduced in a content release, set scheduled content updates to automatically disable new App-IDs, or disable App-IDs for specific applications.
Policy rules referencing App-IDs only match to and enforce traffic based on enabled App-IDs.
Certain App-IDs cannot be disabled and only allow a status of enabled. App-IDs that cannot be disabled included some application signatures implicitly used by other App-IDs (such as unknown-tcp). Disabling a base App-ID could cause App-IDs which depend on the base App-ID to also be disabled. For example, disabling facebook-base will disable all other Facebook App-IDs.
- Disable all App-IDs in a content release
or for scheduled content updates.
- To disable all new App-IDs introduced in a content release, select DeviceDynamic Updates and Install an Application and Threats content release. When prompted, select Disable new apps in content update. Select the check box to disable apps and continue installing the content update; this allows you to be protected against threats, and gives you the option to enable the apps at a later time.
- On the DeviceDynamic Updates page, select Schedule. Choose to Disable new apps in content update for downloads and installations of content releases.
- Disable App-IDs for one application or multiple applications
at a single time.
- To quickly disable a single application or multiple applications at the same time, click ObjectsApplications. Select one or more application check box and click Disable.
- To review details for a single application, and then disable the App-ID for that application, select ObjectsApplications and Disable App-ID. You can use this step to disable both pending App-IDs (where the content release including the App-ID is downloaded to the firewall but not installed) or installed App-IDs.
- Enable App-IDs.Enable App-IDs that you previously disabled by selecting ObjectsApplications. Select one or more application check box and click Enable or open the details for a specific application and click Enable App-ID.
Prepare Policy Updates for Pending App-IDs
Prepare Policy Updates for Pending App-IDs You can now stage seamless policy updates for new App-IDs. Release versions prior to PAN-OS 7.0 required you to ...
Maintain the Rulebase
Maintain the Rulebase Because applications are always evolving, your application whitelist will need to evolve also. Each time you make a change in what applications ...
Review New App-IDs Since Last Content Version
Review New App-IDs Since Last Content Version Select Device Dynamic Updates and select Check Now to refresh the list of available content updates. Download the ...
Manage New App-IDs Introduced in Content Releases
Manage New App-IDs Introduced in Content Releases Installing new App-IDs included in a content release version can sometimes cause a change in policy enforcement for ...
Maintain the Data Center Best Practice Rulebase
As conditions in your data center change, update the Security policy rulebase accordingly. Modify rules to control new and modified applications, protect new servers and ...
Review New App-ID Impact on Existing Policy Rules
Review New App-ID Impact on Existing Policy Rules Select Device Dynamic Updates . You can review the policy impact of new content release versions that ...
Best Practices for Application and Threats Content Updates
Learn the best practices for keeping applications and threats content signatures up-to-date seamlessly. ...
Review New App-IDs
Review New App-IDs Review new App-ID signatures introduced in a Applications and/or Threats content update. For each new application signature introduced, you can preview the ...
App-ID To safely enable applications on your network, the Palo Alto Networks next-generation firewalls provide both an application and web perspective—App-ID and URL Filtering—to protect ...