App-ID identifies the applications traversing your network—regardless of port, protocol, encryption, or any evasive tactics—so that you can safely enable desired applications and block unwanted applications. Palo Alto Networks releases new App-IDs on a monthly basis that your security policy can begin to enforce without any additional configuration. While this enables the firewall to dynamically control application traffic with ever-increasing precision, changes in how the firewall enforces applications can potentially impact availability for the mission-critical applications on which your organization relies.
Now, you no longer need to weigh availability for mission-critical applications against equipping the firewall with the latest application knowledge; with the following options, you can do both, and it’ll be easier for you to move to and maintain an application-based security policy:
- New App-ID Threshold — Fine tune content update installation thresholds so that threat updates install immediately as they’re released, and new App-IDs are installed only after you’ve had an opportunity to make any necessary security policy updates.
- New App-ID Characteristic —Automatically allow new App-IDs in critical categories (like software-development), and get visibility into new App-ID activity on your network.
- Extended Policy Impact Review for Content Releases —Now you can see how currently installed content releases impact security policy enforcement, and policy review is extended to include modified App-IDs. (Previously, you could only perform a policy impact review for new App-IDs before you installed a content release).
- Coverage Change Details for Modified App-IDs —Get details on how coverage for modified applications is now expanded or more precise.