App-ID Cloud Engine
Focus
Focus
SaaS Security

App-ID Cloud Engine

Table of Contents

App-ID Cloud Engine

Learn how App-IDs identify unknown SaaS apps.
Where Can I Use This?What Do I Need?
  • NGFW (Managed by Panorama or Strata Cloud Manager)
  • Prisma Access (Managed by Panorama or Strata Cloud Manager)
  • SaaS Security Inline license
  • NGFW or Prisma Access license
Or any of the following licenses that include the SaaS Security Inline license:
  • CASB-X
  • CASB-PA
App-ID Cloud Engine (ACE) is a service that enables the downloading of App-IDs for unknown SaaS apps from the cloud. ACE converts unknown apps to known apps, vastly increases the number of known App-IDs, speeds up the availability and delivery of new App-IDs, and dramatically increases visibility into apps. App-IDs make it possible to take action (enforce policy) on the SaaS apps you define in SaaS policy rule recommendations.
ACE requires a SaaS Security Inline license. Additionally, on NGFW and Prisma Access (Managed by Panorama) you must enable ACE. However, with a SaaS Security Inline license, ACE is enabled by default on Prisma Access (Managed by Strata Cloud Manager).
Traditional, content-delivered App-ID only delivers new apps once per month and you need to analyze the new App-IDs before you install them to understand changes that they might make to Security policy rules. The monthly cadence and need for analysis slows down the adoption of new App-IDs in policy. ACE changes that scenario by providing on-demand App-IDs for SaaS apps identified as ssl, web-browsing, unknown-tcp, and unknown-udp.
Cloud-delivered App-IDs provide specific identification of ssl, web-browsing, unknown-tcp, and unknown-udp apps, which enables you to understand them and control them appropriately in SaaS Security policy. However, Cloud-delivered App-IDs don’t identify other types of public apps and don’t identify private and custom apps.
Cloud App-IDs don’t force you to examine how the new App-IDs affect Security policy because the firewall uses them according to previously existing Security policy until you do one of the following:
  • Create Application Filters on Prisma Access (Managed by Strata Cloud Manager) or Application Filters Prisma Access (Managed by Panorama). Use application filters as often as possible to automate adding new cloud-delivered App-IDs to Security policy rules. When a new App-ID matches an application filter, it's automatically added to the filter. When you use an application filter in a Security policy rule, the rule automatically controls the application traffic for App-IDs that have been added to the filter. In other words, application filters are your “Easy Button” for securing cloud-delivered App-IDs automatically to gain maximum visibility and control with minimum effort.
  • Add the App-IDs to application groups.
  • Use the Policy Optimizer Prisma Access (Managed by Strata Cloud Manager) or Policy Optimizer on NGFW and Prisma Access (Managed by Panorama) to add the App-IDs to a cloned rule or to an existing rule, or to an existing application filter or application group. You can also use Policy Optimizer to create new application filters and application groups directly from within the Policy Optimizer tool.