At which point in the App-ID update process can you determine if an existing policy rule is affected by an App-ID update?
At which point in the App-ID update process can you determine if an existing policy rule is affected by an App-ID update?
To determine if an existing policy rule is affected by an App-ID update, it is necessary to download the update first. After the download is complete, the option to review the policies that are affected by the new application signatures becomes available. This review process cannot be performed at earlier stages such as just checking for updates, committing the firewall configuration, or simply downloading the update, as it specifically requires the update to be installed. Therefore, the correct step at which you can determine if an existing policy is affected is after downloading the update.
Answer is D. Clicking "check now" just looks for new updates. If you have a schedule set up the system is already looking for new updates on its own though. To see if an update will affect an existing rule, you have to download the update and then click on "review policies" to see impact the update will have (Answer D).
Answer is D "Action > Download: Additionally, downloading an Application and Threat content release version enables the option to Review Policies that are affected by new application signatures included with the release." https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/device/device-dynamic-updates.html
Answer is A, I checked on the Firewall
Correct Answer: D
D is correct Must be downloaded or installed https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
Very Tricky. Yes, "after the download" you must A. A is the last step you can take before choosing to Commit. You don't have an "A" until you "D" but "D" is not "A".
Palo: "downloading an Application and Threat content release version enables the option to Review Policies that are affected by new application signatures included with the release"
Sorry Answer is A
When an Applications and Threats content update is performed, which is the earliest point you can review the impact of new application signatures on existing policies? - after download [Palo Alto Networks]
D https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
D make more sense to me.
Sorry Answer is A
Lists the versions that are currently available on the Palo Alto Networks Update Server. To check if a new software release is available from Palo Alto Networks, click Check Now. The firewall uses the service route to connect to the Update Server and checks for new content release versions and, if there are updates available, displays them at the top of the list.