What are two best practices for incorporating new and modified App-IDs? (Choose two.)
What are two best practices for incorporating new and modified App-IDs? (Choose two.)
To best incorporate new and modified App-IDs, it is important to first study the release notes to ensure that the new App-IDs have a low impact on the network. Additionally, performing a Best Practice Assessment helps evaluate the potential impact of new or modified App-IDs on network security and performance. These practices ensure that any changes introduced by new App-IDs are well-understood and managed, minimizing risk and maintaining network integrity.
BC https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/app-id-updates-workflow#id182P00F0FEI
BC Release notes + Security Policy
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-upgrade/software-and-content-updates/best-practices-for-app-and-threat-content-updates/best-practices-security-first#id184AH00F06E
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/app-id-updates-workflow
Selected Answer: BD
You can also review Content Release Notes for apps and threats on the Palo Alto Networks Support Portal or directly in the firewall web interface: select Device Dynamic Updates and open the Release Note for a specific content release version.
Answers are B, C. Always review Content Release Notes for the list of newly-identified and modified application and threat signatures that the content release introduces. Configure a security policy rule to always allow new App-IDs that might have network-wide impact, like authentication or software development applications.
how C can be a correct answer? Automatically allowing new App-IDs without careful assessment can introduce security risks. It is important to review and test new App-IDs before allowing them in a production environment.