What are two best practices for incorporating new and modified App-IDs? (Choose two.)
What are two best practices for incorporating new and modified App-IDs? (Choose two.)
To best incorporate new and modified App-IDs, it is important to first study the release notes to ensure that the new App-IDs have a low impact on the network. Additionally, performing a Best Practice Assessment helps evaluate the potential impact of new or modified App-IDs on network security and performance. These practices ensure that any changes introduced by new App-IDs are well-understood and managed, minimizing risk and maintaining network integrity.
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-upgrade/software-and-content-updates/best-practices-for-app-and-threat-content-updates/best-practices-security-first#id184AH00F06E
BC Release notes + Security Policy
BC https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/app-id-updates-workflow#id182P00F0FEI
how C can be a correct answer? Automatically allowing new App-IDs without careful assessment can introduce security risks. It is important to review and test new App-IDs before allowing them in a production environment.
Answers are B, C. Always review Content Release Notes for the list of newly-identified and modified application and threat signatures that the content release introduces. Configure a security policy rule to always allow new App-IDs that might have network-wide impact, like authentication or software development applications.
You can also review Content Release Notes for apps and threats on the Palo Alto Networks Support Portal or directly in the firewall web interface: select Device Dynamic Updates and open the Release Note for a specific content release version.
Selected Answer: BD
https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/app-id-updates-workflow