docs.paloaltonetworks.com Open in urlscan Pro
96.16.88.147  Public Scan

Submitted URL: http://u574567.ct.sendgrid.net/ls/click?upn=-2BS9VqljWew6VGBh-2FYW4Bt0JR-2BqCV7XxCoxgLxV4lNjkIvZ9MRKyXi2yeO50LMKCYOJUOo3DPYzdf7...
Effective URL: https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/review-new-app...
Submission: On February 23 via api from IL — Scanned from IL

Form analysis 2 forms found in the DOM

<form><span class="fieldset">
    <p><input type="checkbox" value="check" id="chkMain" checked="checked" class="legacy-group-status optanon-status-checkbox"><label for="chkMain">Active</label></p>
  </span></form>

Name: searchGET /content/techdocs/en_US/search.html

<form class="td-nav-search__form" name="search" action="/content/techdocs/en_US/search.html" method="get">
  <div class="td-selectable">
    <div class="td-selectable__button">PAN-OS® Administrator’s Guide</div>
    <ul class="td-dropdown__menu td-selectable__body">
      <li class="td-selectable__item td-dropdown__link td-selectable__label" data-value="pan:book-type/non-cloud,pan:book-type/panw-yellow-theme,pan:book-name/pan-os-admin">PAN-OS® Administrator’s Guide</li>
      <li class="td-selectable__item td-dropdown__link td-selectable__label" data-value="all">All Documentation</li>
    </ul>
    <div class="td-selectable__radios">
      <input type="radio" name="context" value="pan:book-type/non-cloud,pan:book-type/panw-yellow-theme,pan:book-name/pan-os-admin" checked="" data-label="PAN-OS® Administrator’s Guide" aria-label="PAN-OS® Administrator’s Guide"> &gt; <input
        type="radio" name="context" value="all" data-label="All Documentation" aria-label="All Documentation">
    </div>
  </div>
  <input type="hidden" name="contextText" value="PAN-OS® Administrator’s Guide">
  <input type="hidden" name="product" value="PAN-OS">
  <!-- not required if already run in search page -->
  <script type="text/javascript">
    var dropdownSelectedValue = "all";
    facetSearchTags =
      "pan:productcategory/panos,pan:productcategory/ngfw,pan:osversion/10_2,pan:productcategory/network-security,pan:productcategory/strata,pan:feature/dynamic-updates,pan:book-name/pan-os-admin,pan:osversion/pan-os-10-2,pan:book-type/non-cloud,pan:informationtype/admin,pan:feature-category/content-release,pan:feature-category/app-id,pan:book-type/panw-yellow-theme";
    allTags =
      "pan:feature-category/virtualsystems||Virtual Systems,pan:feature-category/device-id||Device-ID,pan:feature-category/endpoint-security-manager||Endpoint Security Manager,pan:feature-category/threatprevention||Threat Prevention,pan:feature-category/threat-intelligence||Threat Intelligence,pan:feature-category/decryption||Decryption,pan:feature-category/saas-security||SaaS Security,pan:feature-category/traps-management-service||Traps Management Service,pan:feature-category/authentication||Authentication,pan:feature-category/traps||Traps,pan:feature-category/networkintegration||Network Integration,pan:feature-category/installation||Installation,pan:feature-category/plugins||Plugins,pan:feature-category/deployment||Deployment,pan:feature-category/policy||Policy,pan:feature-category/remote-networks||Remote Networks,pan:feature-category/qos||QoS,pan:feature-category/zone-and-dos-protection||Zone and DoS Protection,pan:feature-category/vpns||VPNs,pan:feature-category/analysis||Analysis,pan:feature-category/cloud-infrastructure-protection||Cloud Infrastructure Protection,pan:feature-category/mobile-users||Mobile Users,pan:feature-category/service-connections||Service Connections,pan:feature-category/service-infrastructure||Service Infrastructure,pan:feature-category/mobile-network-infrastructure||Mobile Network Infrastructure,pan:feature-category/device-telemetry||Device Telemetry,pan:feature-category/dns-security||DNS Security,pan:feature-category/reportingandlogging||Reporting and Logging,pan:feature-category/certificatemanagement||Certificate Management,pan:feature-category/ztp||ZTP,pan:feature-category/devicemanagement||Device Management,pan:feature-category/containers||Containers,pan:feature-category/useridentification||User-ID,pan:feature-category/certification||Certification,pan:feature-category/highavailability||High Availability,pan:feature-category/hardware||Hardware,pan:feature-category/public-cloud||Public Cloud,pan:feature-category/open-source-software||Open Source Software,pan:feature-category/initialconfiguration||Initial Configuration,pan:feature-category/urlfiltering||URL Filtering,pan:feature-category/app-id||App-ID,pan:feature-category/serverless||Serverless,pan:feature-category/content-release||Content Release,pan:feature-category||Feature Category,pan:feature/pa-500-firewall||PA-500 Firewall,pan:feature/gre-tunnels||GRE Tunnels,pan:feature/pa-800-series||PA-800 Series,pan:feature/activity-reports||Activity Reports,pan:feature/saml||SAML,pan:feature/telemetry||Telemetry,pan:feature/context-switch||Context Switch,pan:feature/ipsec||IPSec,pan:feature/dos-protection||DoS Protection,pan:feature/dlc||DLC,pan:feature/nutanix||Nutanix,pan:feature/fips||FIPS,pan:feature/pa-3050-firewall||PA-3050 Firewall,pan:feature/session-settings||Session Settings,pan:feature/bootstrapping||Bootstrapping,pan:feature/app-data-restrictions||App Data Restrictions,pan:feature/threat-logs||Threat Log,pan:feature/gp-portal||GlobalProtect Portal,pan:feature/tacacs||TACACS+,pan:feature/virtual-router||Virtual Router,pan:feature/scep||SCEP,pan:feature/gke||GKE,pan:feature/tags||Tags,pan:feature/ocsp||OCSP,pan:feature/m-600-appliance||M-600 Appliance,pan:feature/address-objects||Address Objects,pan:feature/pa-5050-firewall||PA-5050 Firewall,pan:feature/dhcp||DHCP,pan:feature/http||HTTP,pan:feature/config-log||Configuration Log,pan:feature/allow-list||Allow List,pan:feature/log-forwarding||Log Forwarding,pan:feature/app-override||App Override,pan:feature/gp-100-appliance||GP-100 Appliance,pan:feature/syslog||Syslog,pan:feature/tcp||TCP,pan:feature/deployment-policy||Deployment Policy,pan:feature/pa-3000-series||PA-3000 Series,pan:feature/nat||NAT,pan:feature/redistribution||Redistribution,pan:feature/botnet-reports||Botnet Reports,pan:feature/ssl-vpn||SSL VPN,pan:feature/exploit-prevention-module||Exploit Prevention Module,pan:feature/enterprise-app||Enterprise App,pan:feature/condition||Conditions,pan:feature/pa-5220-firewall||PA-5220 Firewall,pan:feature/pan-db||PAN-DB,pan:feature/microsoft-azure-government-cloud||Microsoft Azure Government Cloud,pan:feature/block-list||Block List,pan:feature/custom-signatures||Custom Signatures,pan:feature/hip-match-log||HIP Match Log,pan:feature/authentication-sequence||Authentication Sequence,pan:feature/pim||PIM,pan:feature/tap-mode||Tap Mode,pan:feature/vmware-vcloud-air||VMware vCloud Air,pan:feature/ssl-inbound-inspection||SSL Inbound Inspection,pan:feature/ntp||NTP,pan:feature/microsoft-azure||Microsoft Azure,pan:feature/contributor||Contributor,pan:feature/file-blocking||File Blocking,pan:feature/pa-5060-firewall||PA-5060 Firewall,pan:feature/vwire||Virtual Wire,pan:feature/user-id-agent||User-ID agent,pan:feature/cli||CLI,pan:feature/cipher-suites||Cipher Suites,pan:feature/kerberos||Kerberos,pan:feature/console||Console,pan:feature/data-filtering-log||Data Filtering Log,pan:feature/decryption-port-mirroring||Decryption Port Mirroring,pan:feature/directory-sync-service-agent||Directory Sync Agent,pan:feature/pa-5250-firewall||PA-5250 Firewall,pan:feature/device-groups||Device Groups,pan:feature/check-in||Check-in,pan:feature/pa-3260-firewall||PA-3260 Firewall,pan:feature/satellite||Satellite,pan:feature/pa-3020-firewall||PA-3020 Firewall,pan:feature/m-500-appliance||M-500 Appliance,pan:feature/gp-app||GlobalProtect App,pan:feature/pa-5280-firewall||PA-5280 Firewall,pan:feature/data-filtering||Data Filtering,pan:feature/mobile-security-manager||Mobile Security Manager,pan:feature/pa-5000-series||PA-5000 Series,pan:feature/antivirus||Antivirus,pan:feature/wildfire-submissions-log||WildFire Submissions Log,pan:feature/gp-gateway||GlobalProtect Gateway,pan:feature/ips-signature-converter||IPS Signature Converter,pan:feature/external-dynamic-list||External Dynamic List,pan:feature/custom-url||Custom URL,pan:feature/per-app-vpn||Per App VPN,pan:feature/ace||Automated Correlation Engine,pan:feature/dynamic-user-groups||Dynamic User Groups,pan:feature/pa-5260-firewall||PA-5260 Firewall,pan:feature/partner||Partner,pan:feature/dynamic-address-groups||Dynamic Address Groups,pan:feature/x-auth||X-Auth,pan:feature/brightcloud||BrightCloud,pan:feature/ssl-forward-proxy||SSL Forward Proxy,pan:feature/applications||Applications,pan:feature/active-passive||Active-Passive,pan:feature/pa-200||PA-200,pan:feature/exception||Exception,pan:feature/security-events||Security Events,pan:feature/roles||Roles,pan:feature/ts-agent||Terminal Server Agent,pan:feature/pre-logon||Pre-Logon,pan:feature/cisco-csp||Cisco CSP,pan:feature/risk-remediation||Risk Remediation,pan:feature/search||Search,pan:feature/dynamic-updates||Dynamic Updates,pan:feature/packet-capture||Packet Capture,pan:feature/ntlm||NTLM,pan:feature/ecmp||ECMP,pan:feature/google-cloud-platform||Google Cloud Platform,pan:feature/hashes||Hashes,pan:feature/xml-api||XML API,pan:feature/playbook||Playbook,pan:feature/vpp||VPP,pan:feature/quarantine||Quarantine,pan:feature/pbf||Policy Based Forwarding,pan:feature/app-scope||App-Scope,pan:feature/security-profiles||Security Profiles,pan:feature/remediation||Remediation,pan:feature/snmp||SNMP,pan:feature/cloud||Cloud,pan:feature/m-200-appliance||M-200 Appliance,pan:feature/zones||Zones,pan:feature/script||Script,pan:feature/thread-injection||Thread Injection,pan:feature/signatures||Signatures,pan:feature/alarms||Alarms,pan:feature/crl||CRL,pan:feature/certificate-profile||Certificate Profile,pan:feature/admin-access||Admin Access,pan:feature/alibaba-cloud||Alibaba Cloud,pan:feature/openstack||OpenStack,pan:feature/access-domain||Access Domain,pan:feature/apns||APNs,pan:feature/virtual-appliance||Virtual Appliance,pan:feature/pa-220-firewall||PA-220 Firewall,pan:feature/configuration||Configuration File,pan:feature/safe-search||Safe Search,pan:feature/processes||Processes,pan:feature/command||Command,pan:feature/app-store||Enterprise App Store,pan:feature/ospf||OSPF,pan:feature/url-filtering-profile||URL Filtering Profile,pan:feature/authentication-policy||Authentication Policy,pan:feature/traffic-logs||Traffic Log,pan:feature/active-active||Active-Active,pan:feature/netflow||NetFlow,pan:feature/large-scale-vpn||Large Scale VPN,pan:feature/pa-220r-firewall||PA-220R Firewall,pan:feature/tunnel-inspection||Tunnel Inspection,pan:feature/response-page||Response Page,pan:feature/multicast||Multicast,pan:feature/aks||AKS,pan:feature/ssh-proxy||SSH Proxy,pan:feature/group-mapping||Group Mapping,pan:feature/policy-optimizer||Policy Optimizer,pan:feature/vdi||VDI,pan:feature/aws-govcloud||AWS GovCloud,pan:feature/radius||RADIUS,pan:feature/url-filtering-log||URL Filtering Log,pan:feature/cisco-trustsec||Cisco TrustSec,pan:feature/pa-4000-series||PA-4000 Series,pan:feature/acc||ACC,pan:feature/m-series-appliance||M-Series Appliance,pan:feature/single-app-mode||Single App Mode,pan:feature/vmware-nsx||VMware NSX,pan:feature/portal||Portal,pan:feature/minemeld||MineMeld,pan:feature/registration||Registration,pan:feature/wf-500-appliance||WF-500 Appliance,pan:feature/pa-3200-series||PA-3200 Series,pan:feature/aws||AWS,pan:feature/crypto-profile||Crypto Profile,pan:feature/m-100-appliance||M-100 Appliance,pan:feature/pa-850-firewall||PA-850 Firewall,pan:feature/dynamic-block-list||Dynamic Block List,pan:feature/sctp||SCTP,pan:feature/pa-820-firewall||PA-820 Firewall,pan:feature/pa-3060-firewall||PA-3060 Firewall,pan:feature/unknown-applications||Unknown Applications,pan:feature/data-center||Data Center,pan:feature/authentication-profile||Authentication Profile,pan:feature/vulnerability-protection||Vulnerability Protection,pan:feature/directory-sync-service||Directory Sync,pan:feature/layer-2||Layer 2,pan:feature/pa-7000-series||PA-7000 Series,pan:feature/web-interface||Web Interface,pan:feature/correlation-log||Correlation Log,pan:feature/ingestion||Ingestion,pan:feature/mfa||MFA,pan:feature/ike||IKE,pan:feature/logs||Logs,pan:feature/vlan||VLAN,pan:feature/dns||DNS,pan:feature/user-mapping||User Mapping,pan:feature/software-updates||Software Updates,pan:feature/db-configuration-tool||DB Configuration Tool,pan:feature/kvm||KVM,pan:feature/site-to-site-vpn||Site-to-Site VPN,pan:feature/master-key||Master Key,pan:feature/predefined-reports||Predefined Reports,pan:feature/trusted-signers||Trusted Signers,pan:feature/mgt||Management Interface,pan:feature/eks||EKS,pan:feature/integration||Integration,pan:feature/pdf-summary-reports||PDF Summary Reports,pan:feature/dynamic-routing||Dynamic Routing,pan:feature/report-groups||Report Groups,pan:feature/static-routes||Static Routes,pan:feature/automation||Automation,pan:feature/custom-applications||Custom Applications,pan:feature/pa-7050-firewall||PA-7050 Firewall,pan:feature/configuration-profile||Configuration Profile,pan:feature/hsm||HSM,pan:feature/email-notification||Email Notification,pan:feature/interfaces||Interfaces,pan:feature/templates||Templates,pan:feature/microsoft-hyper-v||Microsoft Hyper-V,pan:feature/service-route||Service Route,pan:feature/mapping||Mapping,pan:feature/collector-group||Collector Group,pan:feature/mirantis-openstack||Mirantis OpenStack,pan:feature/sd-wan||SD-WAN,pan:feature/pa-3250-firewall||PA-3250 Firewall,pan:feature/layer-3||Layer 3,pan:feature/url-category||URL Category,pan:feature/rip||RIP,pan:feature/licensing||Licensing,pan:feature/common-criteria||Common Criteria,pan:feature/enrollment||Enrollment,pan:feature/decryption-policy||Decryption Policy,pan:feature/upgrade-downgrade||Upgrade-Downgrade,pan:feature/lacp||LACP,pan:feature/managed-domains||Managed Domains,pan:feature/pa-3220-firewall||PA-3220 Firewall,pan:feature/objects||Objects,pan:feature/system-log||System Log,pan:feature/pa-7080-firewall||PA-7080 Firewall,pan:feature/forensics||Forensics,pan:feature/zone-protection||Zone Protection,pan:feature/clientless-vpn||Clientless VPN,pan:feature/api||API,pan:feature/managed-app||Managed App,pan:feature/icmp||ICMP,pan:feature/alg||ALG,pan:feature/igmp||IGMP,pan:feature/malware-prevention||Malware Prevention,pan:feature/python||Python,pan:feature/udp||UDP,pan:feature/oracle-cloud-infrastructure||Oracle Cloud Infrastructure,pan:feature/bfd||BFD,pan:feature/custom-reports||Custom Reports,pan:feature/gtp||GTP,pan:feature/bgp||BGP,pan:feature/captive-portal||Captive Portal,pan:feature/mobile-devices||Mobile Devices,pan:feature/cytool||Cytool,pan:feature/hip||HIP,pan:feature/ldap||LDAP,pan:feature/vmware-esxi||VMware ESXi,pan:feature/vm-information-sources||VM Information Sources,pan:feature/phishing-prevention||Phishing Prevention,pan:feature/dashboard||Dashboard,pan:feature/cisco-aci||Cisco ACI,pan:feature/lldp||LLDP,pan:feature/alerts||Alerts,pan:feature/security-policy||Security Policy,pan:feature/log-collector||Log Collector,pan:feature/citrix-sdx||Citrix SDX,pan:feature/commit||Commit,pan:feature/pa-5200-series||PA-5200 Series,pan:feature/pa-2000-series||PA-2000 Series,pan:feature/exploit-prevention||Exploit Prevention,pan:feature/cisco-encs||Cisco ENCS,pan:feature/powershell||Powershell,pan:feature/anti-spyware||Anti-spyware,pan:feature/services||Services,pan:feature/gcm||GCM,pan:feature/mobile-device-management||Mobile Device Management,pan:feature||Feature,pan:release-information/behavior-changes||Changes to Default Behavior,pan:release-information/addressed-issues||Addressed Issues,pan:release-information/limitations||Limitations,pan:release-information/interoperability||Interoperability,pan:release-information/content-updates||Content Updates,pan:release-information/known-issues||Known Issues,pan:release-information||Release Information,pan:productcategory/virtualization||VM-Series,pan:productcategory/wildfire||WildFire,pan:productcategory/endpoint-security-manager||Endpoint Security Manager,pan:productcategory/advanced-endpoint-protection||Advanced Endpoint Protection,pan:productcategory/traps-management-service||Traps management service,pan:productcategory/traps||Traps,pan:productcategory/device-insights||Device Insights,pan:productcategory/prisma||Prisma,pan:productcategory/cloud-services||Cloud Services,pan:productcategory/logging-service||Logging Service,pan:productcategory/security-lifecycle-review-slr||Security Lifecycle Review (SLR),pan:productcategory/prisma-access||Prisma Access,pan:productcategory/prisma-access-cloud-management||Prisma Access (Cloud Managed),pan:productcategory/demisto||Demisto,pan:productcategory/secdo||Secdo,pan:productcategory/cortex-xdr-analytics||Cortex XDR Analytics,pan:productcategory/cortex||Cortex,pan:productcategory/panos||PAN-OS,pan:productcategory/directory-sync-service||Directory Sync,pan:productcategory/prisma-saas||Prisma SaaS,pan:productcategory/cn-series||CN-Series,pan:productcategory/explore||Explore,pan:productcategory/globalprotect||GlobalProtect,pan:productcategory/hub||Hub,pan:productcategory/strata||Strata,pan:productcategory/prisma-access-panorama-managed||Prisma Access (Panorama Managed),pan:productcategory/aperture||Aperture,pan:productcategory/panorama||Panorama,pan:productcategory/prisma-cloud-compute-edition||Prisma Cloud Compute Edition,pan:productcategory/magnifier||Magnifier,pan:productcategory/cortex-xsoar||Cortex XSOAR,pan:productcategory/cortex-data-lake||Cortex Data Lake,pan:productcategory/globalprotect-cloud-service||GlobalProtect cloud service,pan:productcategory/autofocus||AutoFocus,pan:productcategory/cortex-xdr||Cortex XDR,pan:productcategory/hardware||Hardware,pan:productcategory/redlock||RedLock,pan:productcategory/prisma-cloud||Prisma Cloud,pan:productcategory/log-forwarding-app||Log Forwarding app,pan:productcategory||Product Category,pan:informationtype/task||Task,pan:informationtype/new-feature||New Feature,pan:informationtype/developer||Developer,pan:informationtype/deployment||Deployment,pan:informationtype/usecase||Use Case,pan:informationtype/infographic||Infographic,pan:informationtype/bestpractice||Best Practice,pan:informationtype/reference||Reference,pan:informationtype/translated||Translated,pan:informationtype/troubleshooting||Troubleshooting,pan:informationtype/quickstart||Quick Start,pan:informationtype/video||Video,pan:informationtype/concept||Concept,pan:informationtype||Information Type,pan:book-name/prisma-cloud-admin-compute-and-compute-edition||Prisma Cloud Admin (Compute) and Compute Edition,pan:book-name/globalprotect-admin||GlobalProtect Admin Guide,pan:book-name/autofocus-admin||AutoFocus Admin Guide,pan:book-name/cn-series-deployment||CN-Series Deployment Guide,pan:book-name/prisma-access-panorama-integration-guide||Prisma Access from Panorama Integration Guide,pan:book-name/traps-endpoint-security-manager-new-features||Traps Endpoint Security Manager New Features,pan:book-name/globalprotect-cloud-service-integration||GlobalProtect Cloud Service Integration Guide,pan:book-name/pan-os-cli-quick-start||PAN-OS CLI Quick Start,pan:book-name/redlock-release-notes||RedLock Release Notes,pan:book-name/globalprotect-cloud-service-admin-guide||GlobalProtect Cloud Service Admin Guide,pan:book-name/log-forwarding-app-getting-started||Log Forwarding App Getting Started,pan:book-name/dos-and-zone-protection-best-practices||DoS and Zone Protection Best Practices,pan:book-name/m-200-m-600-appliance-hardware-reference||M-200 and M-600 Appliance Hardware Reference,pan:book-name/prisma-access-panorama-admin||Prisma Access from Panorama Admin Guide,pan:book-name/wildfire-whats-new||WildFire Whats New,pan:book-name/aperture-admin||Aperture Admin Guide,pan:book-name/traps-management-service-admin||Traps Management Service Admin,pan:book-name/prisma-cloud-policy-reference||Prisma Cloud Policy Reference,pan:book-name/pa-3200-hardware-reference||PA-3200 Hardware Reference,pan:book-name/pan-os-release-notes||PAN-OS Release Notes,pan:book-name/test-wildfire-admin||TEST WildFire Admin,pan:book-name/sd-wan-admin||SD-WAN Administrator's Guide,pan:book-name/data-center-best-practices||Data Center Best Practices Guide,pan:book-name/panorama-sd-wan-plugin-help||Panorama SD-WAN Plugin Help,pan:book-name/compatibility-matrix||Compatibility Matrix,pan:book-name/traps-agent-admin||Traps Agent Admin Guide,pan:book-name/traps-esm-agent-admin||Traps ESM Agent Admin Guide,pan:book-name/evident-new-features||Evident New Features Guide,pan:book-name/autofocus-whats-new||AutoFocus Whats New,pan:book-name/directory-sync-service-agent-release-notes||Directory Sync Release Notes,pan:book-name/prisma-cloud-compute-edition-release-notes||Prisma Cloud Compute Edition Release Notes,pan:book-name/prisma-access-panorama-release-notes||Prisma Access from Panorama Release Notes,pan:book-name/device-telemetry-metrics-reference||Device Telemetry Metrics Reference,pan:book-name/pa-5200-hardware-reference||PA-5200 Hardware Reference,pan:book-name/wildfire-admin||WildFire Admin Guide,pan:book-name/redlock-rql-reference||RedLock RQL Reference,pan:book-name/aperture-new-features||Aperture New Features Guide,pan:book-name/prisma-saas-admin||Prisma SaaS Admin Guide,pan:book-name/traps-agent-release-notes||Traps Agent Release Notes,pan:book-name/globalprotect-app-chrome-user-guide||GlobalProtect App Chrome User Guide,pan:book-name/prisma-cloud-admin-compute||Prisma Cloud Admin Guide (Compute),pan:book-name/vm-series-capacity-performance||VM-Series Performance & Capacity,pan:book-name/pan-os-panorama-api||PAN-OS and Panorama API Guide,pan:book-name/wildfire-api||WildFire API Reference,pan:book-name/terminal-services-agent-release-notes||Terminal Services Agent Release Notes,pan:book-name/autofocus-api||AutoFocus API Reference,pan:book-name/security-lifecycle-review-getting-started||Security Lifecycle Review Getting Started Guide,pan:book-name/custom-app-id-and-threat-signatures||Custom App ID and Threat Signatures,pan:book-name/pan-os-xfr-release-notes||PAN-OS XFR Release Notes,pan:book-name/best-practices-for-migrating-to-application-based-policy||Best Practices for Migrating to Application-Based Policy,pan:book-name/test-pan-os-api||TEST PAN-OS API,pan:book-name/prisma-access-cloud-managed-admin||Prisma Access Cloud Managed Admin Guide,pan:book-name/prisma-cloud-admin||Prisma Cloud Admin,pan:book-name/prisma-cloud-compute-edition-admin||Prisma Cloud Compute Edition Admin Guide,pan:book-name/device-insights-getting-started||Device Insights Getting Started,pan:book-name/log-forwarding-app-release-notes||Log Forwarding App Release Notes,pan:book-name/globalprotect-app-new-features||GlobalProtect App New Features,pan:book-name/panorama-admin||Panorama Admin Guide,pan:book-name/decryption-best-practices||Decryption Best Practices Guide,pan:book-name/prisma-cloud-release-notes||Prisma Cloud Release Notes,pan:book-name/pa-220-hardware-reference||PA-220 Hardware Reference,pan:book-name/test-3200-hardware-reference||TEST 3200 hardware reference,pan:book-name/pan-os-admin||PAN-OS Admin Guide,pan:book-name/globalprotect-cloud-service-release-notes||GlobalProtect Cloud Service Release Notes,pan:book-name/pan-os-new-features||PAN OS New Features Guide,pan:book-name/vm-series-and-panorama-plugins-release-notes||VM-Series and Panorama Plugins Release Notes,pan:book-name/prisma-cloud-reference-architecture-compute||Prisma Cloud Reference Architecture (Compute),pan:book-name/magnifier-release-notes||Magnifier Release Notes,pan:book-name/oss-listings||Open-Source Software (OSS) Licenses,pan:book-name/best-practices-getting-started||Best Practices Getting Started,pan:book-name/mobile-network-infrastructure-getting-started||Mobile Network Infrastructure Getting Started Guide,pan:book-name/pa-7000-hardware-reference||PA-7000 Hardware Reference,pan:book-name/cortex-data-lake-getting-started||Cortex Data Lake Getting Started,pan:book-name/hub-getting-started||Hub Getting Started,pan:book-name/vm-series-deployment||VM-Series Deployment Guide,pan:book-name/cloud-services-portal-getting-started||Cloud Services Portal Getting Started,pan:book-name/pa-220r-hardware-reference||PA-220R Hardware Reference,pan:book-name/prisma-cloud-rql-reference||Prisma Cloud RQL Reference,pan:book-name/prisma-saas-release-notes||Prisma SaaS Release Notes,pan:book-name/prisma-cloud-operationalize-compute||Prisma Cloud Operationalize Guide (Compute),pan:book-name/traps-endpoint-security-manager-release-notes||Traps Endpoint Security Manager Release Notes,pan:book-name/traps-agent-user-guide||Traps Agent User Guide,pan:book-name/directory-sync-service-getting-started||Directory Sync Getting Started Guide,pan:book-name/redlock-admin||RedLock Administrator's Guide,pan:book-name/cortex-data-lake-release-notes||Cortex Data Lake Release Notes,pan:book-name/prisma-access-cloud-managed-release-notes||Prisma Access Cloud Managed Release Notes,pan:book-name/iot-security-admin||IoT Security Admin Guide,pan:book-name/bpa-getting-started||Getting Started with the BPA,pan:book-name/zero-trust-best-practices||Zero Trust Best Practices,pan:book-name/internet-gateway-best-practices||Internet Gateway Best Practices Guide,pan:book-name/explore-schema-reference||Explore Schema Reference,pan:book-name/directory-sync-service-agent-help||Directory Sync Help,pan:book-name/evident-getting-started||Evident Getting Started,pan:book-name/iot-security-best-practices||IoT Security Best Practices,pan:book-name/user-id-agent-release-notes||User ID Agent Release Notes,pan:book-name/test-oss-listings||TEST OSS Listings,pan:book-name/globalprotect-app-release-notes||GlobalProtect App Release Notes,pan:book-name/magnifier-getting-started||Magnifier Getting Started Guide,pan:book-name/traps-admin||Traps Endpoint Security Manager Admin Guide,pan:book-name/pa-800-hardware-reference||PA-800 Hardware Reference,pan:book-name/traps-management-service-release-notes||Traps Management Service Release Notes,pan:book-name/explore-getting-started||Explore Getting Started,pan:book-name/globalprotect-app-user-guide||GlobalProtect App User Guide,pan:book-name/pan-os-web-interface-help||PAN-OS Web Interface Help,pan:book-name||Book Name,pan:osversion/4_1||4.1,pan:osversion/3_3||3.3,pan:osversion/2_3||2.3,pan:osversion/6_0||6.0,pan:osversion/8_1||8.1,pan:osversion/4-0-eol||4.0 (EoL),pan:osversion/19_11||Self-Hosted 19.11,pan:osversion/saas||SaaS,pan:osversion/4_2||4.2,pan:osversion/3_0||3.0,pan:osversion/8-0-eol||8.0 (EoL),pan:osversion/4-2-eos||4.2 (EoS),pan:osversion/eol||End-of-Life (EoL),pan:osversion/6-0-eol||6.0 (EoL),pan:osversion/3_1||3.1,pan:osversion/4_0||4.0,pan:osversion/1_0||1.0,pan:osversion/2_2||2.2,pan:osversion/5_5||5.5,pan:osversion/8_0||8.0,pan:osversion/20_08||Self-Hosted 20.08,pan:osversion/7-1-eol||7.1 (EoL),pan:osversion/7_0||7.0,pan:osversion/1_1||1.1,pan:osversion/10_0||10.0,pan:osversion/5_2||5.2,pan:osversion/7-0-eol||7.0 (EoL),pan:osversion/eos||End-of-Sale (EoS),pan:osversion/3_4||3.4,pan:osversion/2_0||2.0,pan:osversion/7_1||7.1,pan:osversion/9_0||9.0,pan:osversion/6_1||6.1,pan:osversion/4-1-eol||4.1 (EoL),pan:osversion/5_0||5.0,pan:osversion/9_1||9.1,pan:osversion/6_2||6.2,pan:osversion/3_2||3.2,pan:osversion/5_1||5.1,pan:osversion/20_04||Self-Hosted 20.04,pan:osversion||OS Version,pan:book-type/non-cloud||Non-Cloud,pan:book-type/cloud-services-app||Cloud Services - App,pan:book-type/cloud-services-service||Cloud Services - Service,pan:book-type/service-providers||Service Providers,pan:book-type/cloud-security||Cloud-Security,pan:book-type/globalprotect-app||GlobalProtect - App,pan:book-type/cloud-delivered||Cloud-Delivered,pan:book-type||Book Type,pan:language/uk-ua||Ukrainian - українська,pan:language/he-il||Hebrew - ישראל,pan:language/de-de||German - Deutsch,pan:language/ru-ru||Russian - Русский,pan:language/ko-kr||Korean - 한국어,pan:language/ar-eg||Arabic - مصر,pan:language/ja-JP||Japanese - 日本語,pan:language/pt-br||Portuguese - Português,pan:language/es-es||Spanish - Español,pan:language/translated||Translated,pan:language/vi-vn||Vietnamese - Tiếng Anh,pan:language/en-us||English,pan:language/fr-fr||French - Français,pan:language/zh-tw||Chinese Traditional - 繁體中文,pan:language/zh-cn||Chinese Simplified - 中文,pan:language||Language,pan:osversion/21_04||Self-Hosted 21.04,pan:osversion/7_3||7.3,pan:osversion/1_7||1.7,pan:osversion/1_8||1.8,pan:osversion/7_2||7.2,pan:feature/cloud-identity-engine||Cloud Identity Engine,pan:productcategory/cloud-identity-engine||Cloud Identity Engine,pan:book-name/pa-5400-hardware-reference||PA-5400 Series Next-Gen Firewall Hardware Reference,pan:book-name/pa-400-hardware-reference||PA-400 Series Next-Gen Firewall Hardware Reference,pan:book-name/pan-os-networking-admin||PAN-OS Networking Administrator’s Guide,pan:book-name/pan-os-openconfig-admin||PAN-OS OpenConfig Administrator’s Guide,pan:osversion/10_1||10.1,pan:osversion/2_1||2.1,pan:book-name/cloud-identity-engine-release-notes||Cloud Identity Engine Release Notes,pan:book-name/cloud-identity-engine-getting-started||Cloud Identity Engine Getting Started,pan:book-name/cloud-identity-agent-help||Cloud Identity Agent Help,pan:productcategory/saas-security-api||SaaS Security API,pan:feature/cloud-identity-agent||Cloud Identity Agent,pan:productcategory/saas-security||SaaS Security,pan:feature/openconfig||OpenConfig,pan:feature/saas-policy-recommendation||SaaS Policy Recommendation,pan:productcategory/saas-security-inline||SaaS Security Inline,pan:feature/app-id-cloud-engine||App-ID Cloud Engine,pan:feature/pa-5400-series||PA-5400 Series,pan:feature/pa-400-series||PA-400 Series,pan:feature/network-packet-broker||Network Packet Broker,pan:productcategory/cloud-identity||Cloud Identity,pan:osversion/9-0-eol||9.0 (EoL),pan:feature/pa-440||PA-440 Firewall,pan:feature/pa-450||PA-450 Firewall,pan:feature/pa-460||PA-460 Firewall,pan:book-name/hosted-services-guide||Hosted Services Guide,pan:osversion/20_09||Self-Hosted 20.09,pan:productcategory/autonomous-dem||Autonomous DEM,pan:osversion/21_08||Self-Hosted 21.08,pan:productcategory/enterprise-dlp||Enterprise DLP,pan:productcategory/iot-security||IoT Security,pan:feature/apoctl||apoctl,pan:book-name/prisma-cloud-identity-based-microsegmentation-release-notes||Prisma Cloud Identity-Based Microsegmentation Release Notes,pan:book-name/prisma-cloud-identity-based-microsegmentation-admin||Prisma Cloud Identity-Based Microsegmentation Admin,pan:osversion/self-hosted-5-0||Self-Hosted 5.0,pan:feature/pa-5450||PA-5450 Firewall,pan:feature-category/government||Government,pan:productcategory/security-automation||Security Operations,pan:osversion/22_01||Self-Hosted 22.01,pan:feature/wf-500b-appliance||WF-500-B Appliance,pan:book-name/aws-transit-gateway-cloudblade-integration||AWS Transit Gateway CloudBlade Integration Guide,pan:osversion/3_1_2||3.1.2 Panorama Managed,pan:osversion/3_1_1||3.1.1 Cloud Managed,pan:osversion/2_1_1||2.1.1 Panorama Managed,pan:osversion/2_1_2||2.1.2 Panorama Managed,pan:osversion/2_0_3||2.0.3 Panorama Managed,pan:osversion/3_0_1||3.0.1 Cloud Managed,pan:osversion/3_1_3||3.1.3 Panorama Managed,pan:book-name/best-practices-for-managing-firewalls-with-panorama||Best Practices for Managing Firewalls with Panorama,pan:osversion/7_7||7.7,pan:osversion/6_8||6.8,pan:book-name/self-serve-application-experience-troubleshooting||Self-Serve Application Experience Troubleshooting,pan:book-name/autonomous-dem||Autonomous DEM Administrator's Guide,pan:book-name/dns-security-admin||DNS Security Administration,pan:book-name/faq||FAQ,pan:informationtype/release-note||Release Notes,pan:book-name/user-id-best-practices||User-ID Best Practices,pan:book-name/zscaler-internet-access-cloudblade-integration||Zscaler Internet Access CloudBlade Integration Guide,pan:book-name/ngfw-release-notes||NGFW Release Notes,pan:book-name/tutorials||Tutorials,pan:book-name/prisma-sd-wan-admin||Prisma SD-WAN Admin Guide,pan:book-name/prisma-sd-wan-symantec-web-security-services-integration||Prisma SD-WAN Symantec Web Security Services Integration,pan:book-name/saas-security-release-notes||SaaS Security Release Notes,pan:book-name/servicenow-cloudblade-integration||ServiceNow CloudBlade Integration Guide,pan:book-name/globalprotect-user-guide||GlobalProtect User Guide,pan:book-name/prisma-sd-wan-virtual-ion-aws-deployment-guide||Prisma SD-WAN Virtual ION on AWS Deployment Guide,pan:book-name/saas-security-admin||SaaS Security Administrator’s Guide,pan:book-name/wildfire-appliance-admin||WildFire Appliance Administrator's Guide,pan:book-name/globalprotect-administration||GlobalProtect Administration,pan:book-name/ztna-agent-user-guide||ZTNA Agent User Guide,pan:book-name/prisma-sd-wan-liveaction-integration||Prisma SD-WAN LiveAction Integration Guide,pan:book-name/tabs||Tabs,pan:book-name/prisma-sd-wan-virtual-ion-gcp-deployment-guide||Prisma SD-WAN Virtual ION on GCP Deployment Guide,pan:book-name/on-premises-controller-for-prisma-sd-wan-release-notes||On-Premises Controller for Prisma SD-WAN Release Notes,pan:book-name/whats-new-in-the-netsec-platform||What’s New in the NetSec Platform,pan:book-name/prisma-sd-wan-cloudblades-release-notes||Prisma SD-WAN CloudBlades Release Notes,pan:book-name/ztna-agent-troubleshooting||ZTNA Agent Troubleshooting Guide,pan:book-name/prisma-sd-wan-ion-cli-reference||Prisma SD-WAN ION CLI Reference,pan:book-name/prisma-sd-wan-virtual-ion-on-azure-deployment-guide||Prisma SD-WAN Virtual ION on Azure Deployment Guide,pan:book-name/prisma-access-amdministration||Prisma Access Administration,pan:book-name/prisma-sd-wan-aws-integration||Prisma SD-WAN AWS Integration Guide,pan:book-name/prisma-sd-wan-release-notes||Prisma SD-WAN Release Notes,pan:book-name/prisma-access-incidents-and-alerts||Prisma Access Incidents & Alerts,pan:book-name/globalprotect-new-features||GlobalProtect New Features,pan:book-name/prisma-sd-wan-virtual-ion-vmware-deployment-guide||Prisma SD-WAN Virtual ION on VMware Deployment Guide,pan:book-name/prisma-sd-wan-incidents-alerts||Prisma SD-WAN Incidents and Alerts,pan:book-name/ngfw-aiops||NGFW AIOps,pan:book-name/prisma-access-integrations||Prisma Access Integrations,pan:book-name/prisma-sase-multitenant-platform||Prisma SASE Multitenant Platform,pan:book-name/prisma-sd-wan-ion-release-notes||Prisma SD-WAN ION Release Notes,pan:book-name/ztna-agent-admin||ZTNA Agent Admin Guide,pan:book-name/prisma-sd-wan-checkpoint-integration-guide||Prisma SD-WAN Checkpoint Integration Guide,pan:book-name/prisma-cloud-intelligence-stream-notifications||Prisma Cloud Inteligence Stream Notifications,pan:book-name/prisma-sd-wan-zoom-qss-cloudblade-integration||Prisma SD-WAN Zoom QSS CloudBlade Integration,pan:book-name/security-policy-best-practices||Security Policy Best Practices,pan:book-name/on-premises-contriller-for-prisma-sd-wan-deployment||On-Premises Controller for Prisma SD-WAN Deployment Guide,pan:book-name/prisma-access-release-notes||Prisma Access Release Notes,pan:book-name/prisma-sd-wan-netskope-integration-guide||Prisma SD-WAN Netskope Integration Guide,pan:book-name/globalprotect-release-notes||GlobalProtect Release Notes,pan:book-name/wf-500-b-appliance-hardware-reference||WF-500-B Appliance Hardware Reference Guide,pan:book-name/prisma-sd-wan-virtual-ion-kvm-nfv-deployment-guide||Prisma SD-WAN Virtual ION on KVM for NFV Deployment Guide,pan:book-name/advanced-wildfire-appliance||Advanced Wildfire Appliance,pan:feature/5g-security||5G Security,pan:book-name/pa-1400-series-hardware-reference||PA-1400 Series Next-Gen Firewall Hardware Reference,pan:book-name/ion-1000-hardware-reference||ION 1000 Hardware Reference,pan:book-name/prisma-access-cloudblade-integration-release-notes-cloud-managed||Prisma Access CloudBlade Integration Release Notes (Cloud managed),pan:book-name/ion-1200-hardware-reference||ION 1200 Hardware Reference,pan:book-name/panorama-interconnect-admin||Panorama Interconnect Administrator’s Guide,pan:book-name/prisma-access-cloudblade-integration-cloud-managed||Prisma Access CloudBlade Integration Guide (Cloud managed),pan:book-name/cloudgenix-ion-device-release-notes||CloudGenix ION Device Release Notes,pan:book-name/m-300-m-700-appliance-hardware-reference||M-300 and M-700 Appliances Hardware Reference,pan:book-name/pan-os-upgrade||PAN-OS Upgrade Guide,pan:book-name/cloudgenix-sd-wan-release-notes||CloudGenix SD-WAN Release Notes,pan:book-name/prisma-access-insights||Prisma Access Insights,pan:book-name/gcp-ncc-cloudblade-integration||GCP-NCC CloudBlade Integration Guide,pan:book-name/iot-security-release-notes||IoT Security Release Notes,pan:book-name/policies-for-network-security||Policies for Network Security,pan:book-name/ion-3000-hardware-reference||ION 3000 Hardware Reference,pan:book-name/prisma-cloud-code-security-policy-reference||Prisma Cloud Code Security Policy Reference,pan:book-name/enterprise-dlp-admin||Enterprise DLP Admin Guide,pan:book-name/iot-security-integration||IoT Security Integration Guide,pan:book-name/ion-3200-hwardware-reference||ION 3200 Hardware Reference,pan:book-name/prisma-access-cloudblade-integration-release-notes||Prisma Access CloudBlade Integration Release Notes,pan:book-name/prisma-cloud-code-security-admin||Prisma Cloud Code Security Admin,pan:book-name/enterprise-dlp-api-reference||Enterprise DLP API Reference,pan:book-name/ion-9000-hardware-reference||ION 9000 Hardware Reference,pan:book-name/iot-security-api||IoT Security API,pan:book-name/prisma-cloud-adoption-guide||Prisma Cloud Adoption Guide,pan:book-name/cloud-ngfw-azure-deployment-guide||Cloud NGFW for Azure Deployment Guide,pan:book-name/ion-2000-hardware-reference||ION 2000 Hardware Reference,pan:book-name/ion-5200-hardware-reference||ION 5200 Hardware Reference,pan:book-name/ion-7000-hardware-reference||ION 7000 Hardware Reference,pan:book-name/common-services-subscription-tenant-management||Common Services  Subscription & Tenant Management,pan:book-name/common-services-device-associations||Common Services  Device Associations,pan:book-name/prisma-access-cloudblade-integration-panorama-managed||Prisma Access CloudBlade Integration Guide (Panorama managed),pan:book-name/prisma-access-cloudblade-integration-guide||Prisma Access CloudBlade Integration Guide,pan:book-name/ion-1200-s-hardware-reference||ION 1200-S Hardware Reference,pan:book-name/common-services-faq||Common Services FaQ,pan:book-name/enterprise-iot-security-admin||Enterprise IoT Security Administrator’s Guide,pan:book-name/ion-9200-hardware-reference||ION 9200 Hardware Reference,pan:book-name/prisma-access-cloudblade-integration-release-notes-panorama-managed||Prisma Access CloudBlade Integration Release Notes (Panorama managed),pan:book-name/common-services-identity-and-access||Common Services  Identity & Access   Access Management,pan:book-name/prisma-cloud-compute-edition-public-sector||Prisma Cloud Compute Edition for Public Sector,pan:book-name/pa-3400-series-hardware-reference||PA-3400 Series Next-Gen Firewall Hardware Reference,pan:book-name/log-forwarding-schema-reference||Log Forwarding Schema Reference,pan:osversion/4-0-preferred||4.0 Preferred,pan:osversion/7-3-eol||7.3 (EoL),pan:osversion/7_5ce||7.5 CE,pan:osversion/7_4||7.4,pan:osversion/20-09-eol||Self-Hosted 20.09 (EoL),pan:osversion/4-0-0-panorama-managed||4.0.0 Panorama Managed,pan:osversion/5_6||5.6,pan:osversion/5_x||5.x,pan:osversion/20-04-eol||Self-Hosted 20.04 (EoL),pan:osversion/3-2-preferred-innovation||3.2 Preferred and Innovation,pan:osversion/20-12-eol||Self-Hosted 20.12 (EoL),pan:osversion/7_5||7.5,pan:osversion/20_12||Self-Hosted 20.12,pan:osversion/1_2||1.2,pan:osversion/3-2-0-panorama-managed||3.2.0 Panorama Managed,pan:osversion/6_5||6.5,pan:osversion/self-hosted-30-xx||Self-Hosted 30.xx,pan:osversion/3-0-preferred-innovation||3.0 Preferred and Innovation,pan:osversion/11_0||11.0,pan:osversion/10_2||10.2,pan:osversion/self-hosted-3-14-legacy||Self-Hosted 3.14 (Legacy),pan:osversion/2-1-preferred||2.1 Preferred,pan:osversion/5_4||5.4,pan:osversion/3-1-5-panorama-managed||3.1.5 Panorama Managed,pan:osversion/6_6||6.6,pan:osversion/7_8||7.8,pan:osversion/7-4-eol||7.4 (EoL),pan:osversion/3-1-5-cloud-managed||3.1.5 Cloud Managed,pan:osversion/4-0-and-later||4.0 & Later,pan:osversion/6-2-eol||6.2 (EoL),pan:osversion/2-1-innovation||2.1 Innovation,pan:osversion/prisma-access-china||Prisma Access China,pan:osversion/19-11-eol||Self-Hosted 19.11 (EoL),pan:osversion/2-0-innovation||2.0 Innovation,pan:osversion/prisma-cloud-enterprise-edition||Prisma Cloud Enterprise Edition,pan:osversion/self-hosted-3-14||Self-Hosted 3.14,pan:osversion/3-1-6-panorama-managed||3.1.6 Panorama Managed,pan:osversion/6_9||6.9,pan:osversion/3-1-3-cloud-managed||3.1.3 Cloud Managed,pan:osversion/7-5-eol||7.5 (Eol),pan:osversion/10-0-eol||10.0 (EoL),pan:osversion/7-2-eol||7.2 (EoL),pan:osversion/test||test,pan:osversion/22_06||Self-Hosted 22.06,pan:osversion/8-1-eol||8.1 (EoL),pan:osversion/5_3||5.3,pan:osversion/2-2-preferred||2.2 Preferred,pan:osversion/5-0-eol||5.0 (EoL),pan:osversion/self-hosted-5-0-legacy||Self-Hosted 5.0 (Legacy),pan:osversion/7_6||7.6,pan:osversion/4-1-preferred||4.1 Preferred,pan:osversion/3-1-6-cloud-managed||3.1.6 Cloud Managed,pan:osversion/6-1-eol||6.1 (EoL),pan:osversion/4-2-eol||4.2 (EoL),pan:osversion/2-0-preferred||2.0 Preferred,pan:osversion/4-0-preferred-innovation||4.0 Preferred and Innovation,pan:osversion/10-1-and-later||10.1 & Later,pan:osversion/3-1-preferred-innovation||3.1 Preferred and Innovation,pan:osversion/5-5-eol||5.5 (EoL),pan:osversion/7-6-eol||7.6 (EoL),pan:productcategory/aiops-for-ngfw||AIOps for NGFW,pan:productcategory/activity||Activity,pan:productcategory/cns||Cloud-Native Security,pan:feature-category/mobile-security||Mobile Security,pan:feature-category/cloud-management-ngfws||Cloud Management of NGFWs,pan:feature-category/subscription-tenant-management||Subscription & Tenant Management,pan:feature-category/self-serve||Self Serve,pan:feature-category/run||Run,pan:feature-category/adem-self-serve||Autonomous DEM Self-Serve,pan:feature-category/code-and-build||Code & Build,pan:feature-category/ztna-connector||ZTNA Connector,pan:feature-category/insights||Insights,pan:feature-category/tenant-management||Tenant Management,pan:feature-category/device-associations||Device Associations,pan:feature-category/deploy||Deploy,pan:feature-category/identify-and-access||Identity & Access,pan:feature-category/dashboard||Dashboard,pan:feature-category/explicit-proxy||Explicit Proxy,pan:informationtype/incidents-and-alerts||Incidents & Alerts,pan:informationtype/admin||Administration,pan:informationtype/user-guide||User Guide,pan:informationtype/appliance||Appliance,pan:informationtype/integrations||Integrations,pan:informationtype/experts-corner||Experts Corner,pan:informationtype/interoperability||Interoperability,pan:informationtype/getting-started||Getting Started,pan:informationtype/help||Help,pan:feature/build-your-dashboard||Build Your Dashboard,pan:feature/autonomous-dem-zoom-integration||Autonomous DEM Zoom Integration,pan:feature/autonomous-dem-self-serve||Autonomous DEM Self-Serve,pan:osversion/21-04-eol||Self-Hosted 21.04 (EoL),pan:osversion/21-08-eol||Self-Hosted 21.08 (EoL),pan:osversion/22_12||Self-Hosted 22.12,pan:productcategory/enterprise-iot-security||Enterprise IoT Security,pan:productcategory/cortex-xpanse||Cortex Xpanse,pan:productcategory/common-services||Common Services,pan:productcategory/data-security||Data Security,pan:productcategory/saas-security-posture-management||SaaS Security Posture Management,pan:productcategory/casb||CASB,pan:productcategory/ztna-agent||ZTNA Agent,pan:productcategory/cortex-xsiam||Cortex XSIAM,pan:productcategory/ngfw||Next-Generation Firewall,pan:productcategory/cloud-ngfw-for-aws||Cloud NGFW for AWS,pan:productcategory/cdss||Cloud-Delivered Security Services,pan:productcategory/prisma-sd-wan||Prisma SD-WAN,pan:productcategory/network-security||Network Security,pan:productcategory/okyo-garde||Okyo Garde,pan:productcategory/prisma-sase||Prisma SASE,pan:productcategory/ai-powered-autonomous-dem||AI-Powered Autonomous DEM,pan:productcategory/cloud-ngfw-for-azure||Cloud NGFW for Azure,pan:productcategory/sase||SASE,pan:book-name/azure-virtual-wan-vion-cloudblade-integration||Azure Virtual WAN with vION CloudBlade Integration Guide,pan:book-name/advanced-wildfire-admin||Advanced WildFire Administration,pan:book-name/advanced-threat-prevention-admin||Advanced Threat Prevention Administration,pan:book-name/aiops-for-ngfw||AIOps for NGFW,pan:book-name/aiops-for-sase||AIOPs for SASE,pan:book-name/advanced-url-filtering-admin||Advanced URL Filtering Administration,pan:book-name/chatbot-ms-teams-cloudblade-integration||Chatbot MS Teams CloudBlade Integration Guide,pan:book-name/azure-vwan-cloudblade-integration||Azure vWAN CloudBlade Integration Guide,pan:book-name/cloud-ngfw-aws-deployment||Cloud NGFW for AWS Deployment Guide,pan:book-name/chatbot-slack-cloudblade-integration||Chatbot Slack CloudBlade Integration Guide,pan:book-name/activity||Activity,pan:book-name/advanced-routing-engine-migration-reference||Advanced Routing Engine Migration Reference,pan:book-name/administrative-access-best-practices||Administrative Access Best Practices,pan:book-name/cn-series-release-notes||CN-Series Release Notes,pan:feature/poe||PoE,pan:feature/tunnel||Tunnel,pan:feature/pa-5410-firewall||PA-5410 Firewall,pan:feature/pa-1400-series||PA-1400 Series,pan:feature/pa-445-firewall||PA-445 Firewall,pan:feature/pa-5420-firewall||PA-5420 Firewall,pan:feature/pa-3420-firewall||PA-3420 Firewall,pan:feature/pa-3400-series||PA-3400 Series,pan:feature/pa-5440-firewall||PA-5440 Firewall,pan:feature/pa-3440-firewall||PA-3440 Firewall,pan:feature/pa-410-firewall||PA-410 Firewall,pan:feature/pa-1410-firewall||PA-1410 Firewall,pan:feature/pa-1420-firewall||PA-1420 Firewall,pan:feature/pa-5430-firewall||PA-5430 firewall,pan:feature/pa-3410-firewall||PA-3410 Firewall,pan:feature/pa-3430-firewall||PA-3430 Firewall,pan:feature/panorama-interconnect||Panorama Interconnect,pan:feature/ion-9000||ION 9000,pan:feature/kubernetes||Kubernetes,pan:feature/ion-5200||ION 5200,pan:feature/m-300-appliance||M-300 Appliance,pan:feature/ion-3200||ION 3200,pan:feature/ion-2000||ION 2000,pan:feature/ion-1200||ION 1200,pan:feature/ion-3000||ION 3000,pan:feature/ion-9200||ION 9200,pan:feature/ion-1200-s||ION 1200-S,pan:feature/m-700-appliance||M-700 Appliance,pan:feature/ion-1000||ION 1000,pan:feature/pa-415-firewall||PA-415 Firewall,pan:feature/intelligence-stream||Intelligence Stream,pan:feature/ion-7000||ION 7000,pan:feature/enforcer||Enforcer,pan:feature/configuration2||Configuration,pan:release-date/august-2024||August 2024,pan:release-date/december-2024||December 2024,pan:release-date/december-2023||December 2023,pan:release-date/july-2023||July 2023,pan:release-date/july-2024||July 2024,pan:release-date/june-2023||June 2023,pan:release-date/april-2023||April 2023,pan:release-date/may-2023||May 2023,pan:release-date/february-2024||February 2024,pan:release-date/january-2024||January 2024,pan:release-date/april-2024||April 2024,pan:release-date/august-2023||August 2023,pan:informationtype/aiops||AIOps,pan:release-date/october-2023||October 2023,pan:release-date/november-2023||November 2023,pan:release-date/november-2024||November 2024,pan:release-date/september-2023||September 2023,pan:release-date/october-2024||October 2024,pan:release-date/june-2024||June 2024,pan:release-date/march-2023||March 2023,pan:release-date/may-2024||May 2024,pan:release-date/march-2024||March 2024,pan:informationtype/china-administration||China Administration,pan:release-date/september-2024||September 2024,pan:informationtype/prisma-access-china||Prisma Access China,pan:book-type/panw-yellow-theme||PANW Yellow Theme,pan:book-type/panw-green-theme||PANW Green Theme,pan:book-type/panw-blue-theme||PANW Blue Theme,pan:osversion/11-1||11.1,pan:book-name/remote-browser-isolation-release-notes||Remote Browser Isolation Release Notes,pan:book-name/ngfw-incidents-alerts||NGFW Incidents & Alerts,pan:book-name/prisma-cloud-application-security-policy-reference||Prisma Cloud Application Security Policy Reference,pan:book-name/remote-browser-isolation-administration||Remote Browser Isolation Administration,pan:book-name/quantum-security-admin||Quantum Security Administration,pan:book-name/cn-series-deployment-modes||CN-Series Deployment Modes,pan:book-name/cn-series-getting-started||CN-Series Getting Started,pan:book-name/security-policy-administration||Security Policy Administration,pan:book-name/cn-series-upgrade||CN-Series Upgrade,pan:book-name/ngfw-administration||NGFW Administration,pan:book-name/pa-400r-hardware-reference||PA-400R Hardware Reference,pan:book-name/cn-series-troubleshooting||CN-Series Troubleshooting,pan:book-name/pa-7500-series-ngfw-hardware-reference||PA-7500 Series Next-Gen Firewall Hardware Reference,pan:book-name/cn-series-hsf-deployment||CN-Series HSF Deployment,pan:book-name/ngfw-getting-started||NGFW Getting Started,pan:book-name/prisma-cloud-application-security||Prisma Cloud Application Security,pan:book-name/ipsec-vpn-administration||IPsec VPN Administration,pan:book-name/cn-series-in-cloud-and-on-prem||CN-Series In-Cloud and On-Prem,pan:feature/pa-7500-series||PA-7500 Series,pan:feature/pa-5445-firewall||PA-5445 Firewall,pan:feature/pa-7500-firewall||PA-7500 Firewall,pan:feature/pa-455-firewall||PA-455 Firewall,pan:feature/pa-415-5g-firewall||PA-415-5G Firewall,pan:feature/pa-400r-firewall||PA-400R Firewall,pan:informationtype/networking||Networking,pan:informationtype/upgrade||Upgrade,pan:informationtype/security-policy-administration||Security Policy Administration,pan:informationtype/quantum-security-administration||Quantum Security Administration,pan:informationtype/ipsec-vpn-administration||IPsec VPN Administration,pan:osversion/aiops-for-ngfw-app||AIOps for NGFW app,pan:osversion/pan-os-11-0||PAN-OS 11.0,pan:osversion/aiops-for-ngfws||AIOps for NGFWs,pan:osversion/22-06-eol||Self-Hosted 22.06 (EoL),pan:osversion/pan-os-11-1||PAN-OS 11.1,pan:osversion/22-01-eol||Self-Hosted 22.01 (EoL),pan:osversion/ngfws||NGFWs,pan:osversion/aiops-for-ngfw-with-strata-cloud-manager||AIOps for NGFW with Strata Cloud Manager,pan:osversion/4-2-preferred||4.2 Preferred,pan:osversion/cloud-management-of-ngfws||Cloud Management of NGFWs,pan:productcategory/strata-cloud-manager||Strata Cloud Manager,pan:productcategory/remote-browser-isolation||Remote Browser Isolation,pan:osversion/deployment-modes||Deployment Modes,pan:osversion/pan-os-8-1-eol||PAN-OS 8.1 (EoL),pan:osversion/pan-os-10-1||PAN-OS 10.1,pan:osversion/in-cloud-and-on-prem||In-Cloud and On-Prem,pan:osversion/pan-os-10-0-eol||PAN-OS 10.0 (EoL),pan:osversion/pan-os-9-1||PAN-OS 9.1,pan:osversion/pan-os-10-2||PAN-OS 10.2,pan:osversion/5-0-preferred-innovation||5.0 Preferred and Innovation,pan:osversion/3-1-eol||3.1 (EoL),pan:osversion/3-0-eol||3.0 (EoL),pan:osversion/1_3||1.3,pan:osversion/6_3||6.3,pan:osversion/self-hosted-31-xx||Self-Hosted 31.xx,pan:osversion/5-0-preferred||5.0 Preferred,pan:osversion/classic||Classic,pan:osversion/hsf||HSF,pan:osversion/5-0-innovation||5.0 Innovation,pan:osversion/pan-os-9-0-eol||PAN-OS 9.0 (EoL),pan:osversion/11_1||11.1,pan:osversion/cloud-management-and-aiops-for-ngfw||Cloud Management and AIOps for NGFW,pan:release-date||Release Date,pan:informationtype/activation-and-onboarding||Activation & Onboarding,pan:osversion/5-0-1-preferred-innovation||5.0.1 Preferred and Innovation";
    docsetid = "";
    const LANGTAGCODE = "pan:language/";
    PRODUCTTAGCODE = "pan:productcategory/";
    INFOTYPETAGCODE = "pan:informationtype/";
    OSVERTAGCODE = "pan:osversion/";
    FEATTAGCODE = "pan:feature/";
    FEATCATTAGCODE = "pan:feature-category/";
    BNCATAGCODE = "pan:book-name/";
    BTTAGCODE = "pan:book-type/";
    RELINFOTAGCODE = "pan:release-information/";
    PRODUCTFAMILYCODE = "pan:productfamily/";
    var langFacetValueCaption = {};
    productFacetValueCaption = {};
    infoTypeFacetValueCaption = {};
    osVersionFacetValueCaption = {};
    featureFacetValueCaption = {};
    featureCatFacetValueCaption = {};
    bookNameFacetValueCaption = {};
    bookTypeFacetValueCaption = {};
    releaseInfoFacetValueCaption = {};
    $.each(allTags.split(","), function(index, value) {
      if (value.indexOf(LANGTAGCODE) > -1) {
        langFacetValueCaption[value.split(LANGTAGCODE)[1].split("||")[0].replace("-", "_")] = value.split(LANGTAGCODE)[1].split("||")[1]
      } else if (value.indexOf(PRODUCTTAGCODE) > -1) {
        productFacetValueCaption[value.split(PRODUCTTAGCODE)[1].split("||")[0]] = value.split(PRODUCTTAGCODE)[1].split("||")[1]
      } else if (value.indexOf(INFOTYPETAGCODE) > -1) {
        infoTypeFacetValueCaption[value.split(INFOTYPETAGCODE)[1].split("||")[0]] = value.split(INFOTYPETAGCODE)[1].split("||")[1]
      } else if (value.indexOf(OSVERTAGCODE) > -1) {
        osVersionFacetValueCaption[value.split(OSVERTAGCODE)[1].split("||")[0]] = value.split(OSVERTAGCODE)[1].split("||")[1]
      } else if (value.indexOf(FEATTAGCODE) > -1) {
        featureFacetValueCaption[value.split(FEATTAGCODE)[1].split("||")[0]] = value.split(FEATTAGCODE)[1].split("||")[1]
      } else if (value.indexOf(FEATCATTAGCODE) > -1) {
        featureCatFacetValueCaption[value.split(FEATCATTAGCODE)[1].split("||")[0]] = value.split(FEATCATTAGCODE)[1].split("||")[1]
      } else if (value.indexOf(BNCATAGCODE) > -1) {
        bookNameFacetValueCaption[value.split(BNCATAGCODE)[1].split("||")[0]] = value.split(BNCATAGCODE)[1].split("||")[1]
      } else if (value.indexOf(BTTAGCODE) > -1) {
        bookTypeFacetValueCaption[value.split(BTTAGCODE)[1].split("||")[0]] = value.split(BTTAGCODE)[1].split("||")[1]
      } else if (value.indexOf(RELINFOTAGCODE) > -1) {
        releaseInfoFacetValueCaption[value.split(RELINFOTAGCODE)[1].split("||")[0]] = value.split(RELINFOTAGCODE)[1].split("||")[1]
      }
    });
    /* Since Coveo has an issue with setting value added captions for upper case, as part of COVEO-187 hardcoding chinese simplified zh_CN */
    if (langFacetValueCaption["zh_cn"]) {
      langFacetValueCaption["zh_CN"] = langFacetValueCaption["zh_cn"]
    }
    var sourceValueCaption = {
      "TechDocs Sitemap": "Technical Documentation",
      "PANW TechDocs Stage": "Technical Documentation",
      "Salesforce Knowledge SIT": "Knowledge Base",
      "PAN techDOCS": "Technical Documentation",
      "Salesforce Knowledge": "Knowledge Base",
      "techDocs YouTube": "Videos",
      "TD GitHub": "GitHub",
      "LIVEcommunity Public": "LIVEcommunity",
      "TD pan.dev Docs": "Developer Docs",
      "Developer Docs": "Developer Docs"
    };

    function buildExpressionFromSelectedTags(aemTags, advanceQueryExpFun, langQueryExpfun) {
      /** Tag Based Search **/
      var languageFacetValues = [];
      productFacetValues = [];
      infoTypeFacetValues = [];
      osVersionFacetValues = [];
      featureFacetValues = [];
      bookNameFacetValues = [];
      featureCatFacetValues = [];
      bookTypeFacetValues = [];
      releaseInfoFacetValues = [];
      productFamilyFacetValues = [];
      $.each(aemTags.split(","), function(index, value) {
        if (value.indexOf(LANGTAGCODE) > -1) {
          languageFacetValues.push(value.split(LANGTAGCODE)[1])
        } else if (value.indexOf(PRODUCTTAGCODE) > -1) {
          productFacetValues.push(productFacetValueCaption[value.split(PRODUCTTAGCODE)[1]])
        } else if (value.indexOf(INFOTYPETAGCODE) > -1) {
          infoTypeFacetValues.push(infoTypeFacetValueCaption[value.split(INFOTYPETAGCODE)[1]])
        } else if (value.indexOf(OSVERTAGCODE) > -1) {
          osVersionFacetValues.push(osVersionFacetValueCaption[value.split(OSVERTAGCODE)[1]])
        } else if (value.indexOf(FEATTAGCODE) > -1) {
          featureFacetValues.push(featureFacetValueCaption[value.split(FEATTAGCODE)[1]])
        } else if (value.indexOf(FEATCATTAGCODE) > -1) {
          featureCatFacetValues.push(featureCatFacetValueCaption[value.split(FEATCATTAGCODE)[1]])
        } else if (value.indexOf(BNCATAGCODE) > -1) {
          bookNameFacetValues.push(bookNameFacetValueCaption[value.split(BNCATAGCODE)[1]])
        } else if (value.indexOf(BTTAGCODE) > -1) {
          bookTypeFacetValues.push(bookTypeFacetValueCaption[value.split(BTTAGCODE)[1]])
        } else if (value.indexOf(RELINFOTAGCODE) > -1) {
          releaseInfoFacetValues.push(releaseInfoFacetValueCaption[value.split(RELINFOTAGCODE)[1]])
        } else if (value.indexOf(PRODUCTFAMILYCODE) > -1) {
          productFamilyFacetValues.push(value.split(PRODUCTFAMILYCODE)[1])
        }
      });
      var expressionBuilder = "";
      expressionBuilder = langQueryExpfun(languageFacetValues, "@language");
      expressionBuilder = advanceQueryExpFun(productFacetValues, "@panproductcategory", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(infoTypeFacetValues, "@paninformationtype", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(osVersionFacetValues, "@panosversion", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(featureFacetValues, "@panfeature", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(featureCatFacetValues, "@panfeaturecategory", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(bookNameFacetValues, "@panbookname", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(bookTypeFacetValues, "@panbooktype", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(releaseInfoFacetValues, "@panreleaseinformation", expressionBuilder);
      expressionBuilder = advanceQueryExpFun(productFamilyFacetValues, "@panproductfamily", expressionBuilder);
      return expressionBuilder;
    }
    // Get Coveo config Details
    let coveo_config = new CoveoPANConfig();
    document.addEventListener("DOMContentLoaded", function() {
      if (typeof Coveo == "undefined") return;
      Coveo.SearchEndpoint.configureCloudV2Endpoint(coveo_config.orgID, coveo_config.apiKey);
      var root = Coveo.$$(document).find("#coveosearcbox");

      function generateSearchBoxExpression(facetArray, field, prevExpr) {
        if (facetArray.length > 0) {
          var expression = '(';
          $.each(facetArray, function(index, value) {
            value = '"' + value + '"';
            expression = (expression == '(') ? expression + value : expression + ',' + value;
          });
          expression = expression + ')';
          expression = field + '==' + expression;
          if (prevExpr == '') {
            return expression;
          } else {
            return prevExpr + ' AND ' + expression;
          }
        }
        return prevExpr;
      }

      function generateSearchBoxLangExpression(languageFacetValues) {
        var lExp = "";
        if (languageFacetValues.length > 0) {
          $.each(languageFacetValues, function(index, value) {
            lExp = (lExp == "") ? "@language==" + value : lExp + " AND @language==" + value;
          });
        }
        return lExp;
      }
      Coveo.$$(root).on('newQuery', function(e, args) {
        if ($(".td-nav-search__form .td-dropdown__menu").length > 0) {
          try {
            /** As selected dropdown value still persisting on clicking back button, when no drodown selected always double the check the default value **/
            dropdownSelectedValue = $(".td-nav-search__form .td-dropdown__menu .td-selectable__item:contains(" + $(".td-nav-search__form .td-selectable__button").text() + ")").attr("data-value");
            /** Check if docsetid available for the selected value. Ticket No = DOCS-2634 **/
            docsetid = $(".td-selectable__radios input[value*='" + dropdownSelectedValue + "']").attr("data-docsetid")
          } catch (error) {
            console.log(error, 'docset id ')
          }
          try {
            /** console.log("dropdownSelectedValue = "+dropdownSelectedValue);
            if(dropdownSelectedValue == "all"){
            debugger;
            } else {
                debugger;
                var expressionBuilder = buildExpressionFromSelectedTags(dropdownSelectedValue,generateSearchBoxExpression,generateSearchBoxLangExpression);
                if(expressionBuilder !=""){
                    Coveo.state(this, 'hd', $(".td-nav-search__form .td-selectable__button").text());
                    Coveo.state(this, 'hq', expressionBuilder);
                }

            } **/
            const dropdownSelectedText = $(".td-nav-search__form .td-selectable__button").text();
            /**  If docsetid available for the selected value. Then change hidden query to docsetid Ticket No = DOCS-2634 **/
            // const allPrdDocResult = dropdownSelectedText.match(new RegExp("All" + "(.*)" + "Documentation"));
            // console.log(allPrdDocResult);
            // if(allPrdDocResult && allPrdDocResult.length>0 && allPrdDocResult[1].trim() != "" && docsetid != "" && docsetid != undefined){
            if (docsetid) {
              Coveo.state(this, 'hq', '@td_docsetid==' + docsetid);
              Coveo.state(this, 'hd', $(".td-nav-search__form .td-selectable__button").text());
            } else {
              console.log("dropdownSelectedValue = " + dropdownSelectedValue);
              if (dropdownSelectedValue == "all") {
                console.log("Selected Value is all");
                Coveo.state(this, 'hq', '');
                Coveo.state(this, 'hd', '');
              } else {
                var expressionBuilder = buildExpressionFromSelectedTags(dropdownSelectedValue, generateSearchBoxExpression, generateSearchBoxLangExpression);
                if (expressionBuilder != "") {
                  Coveo.state(this, 'hd', dropdownSelectedText);
                  Coveo.state(this, 'hq', expressionBuilder);
                }
              }
            }
          } catch (err) {
            console.log("error from search box = ");
            console.log(err);
          }
        }
      });
      /** -- used for the redirection - coveo support as example **/
      Coveo.initSearchbox(root, "/content/techdocs/en_US/search.html");
    });
    $(document).ready(function() {
      $(".td-nav-search__form .td-dropdown__menu .td-selectable__item").on("click", function() {
        dropdownSelectedValue = $(this).attr("data-value");
      });
    });
  </script>
  <div id="coveosearcbox" class="CoveoSearchInterface Coveostate CoveoComponentState CoveoComponentOptions CoveoQueryController CoveoDebug coveo-after-initialization" style="display: block;">
    <div class="CoveoFacetsMobileMode"></div>
    <!-- This Analytics section is for Analytics record and Query suggestion -->
    <div class="CoveoAnalytics" data-search-hub="TechDocsPANW_SH"></div>
    <!-- The `coveo-search-section` class is for alignment purpose only -->
    <div class="coveo-search-section">
      <!-- Setting `data-enable-omnibox` and `data-enable-query-suggest-addon` to `true` is not necessary in version 2.x -->
      <div id="headerSearch" class="CoveoSearchbox" data-enable-omnibox="true" data-enable-reveal-query-suggest-addon="true" data-enable-query-syntax="true" data-enable-wildcards="true">
        <div class="CoveoOmnibox magic-box" role="search" aria-haspopup="listbox">
          <div class="magic-box-input">
            <div class="magic-box-underlay"><span class="magic-box-highlight-container"><span data-id="start" data-success="true"><span data-id="Start" data-success="true"><span data-id="Empty" data-success="true"
                      data-value=""></span></span></span></span><span class="magic-box-ghost-text"></span></div><input autocomplete="off" type="text" role="combobox" form="coveo-dummy-form" aria-autocomplete="list"
              title="Insert a query. Press enter to send" aria-expanded="false" aria-owns="coveo-magicbox-suggestions-3fe9180f-1390-4d12-be4a-12c9f53cfd7b" aria-controls="coveo-magicbox-suggestions-3fe9180f-1390-4d12-be4a-12c9f53cfd7b"
              aria-label="Search">
            <div class="magic-box-clear coveo-accessible-button" role="button" aria-label="Clear" tabindex="-1" aria-hidden="true">
              <div class="magic-box-icon"><svg focusable="false" enable-background="new 0 0 13 13" viewBox="0 0 13 13" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Clear" class="magic-box-clear-svg">
                  <title>Clear</title>
                  <g fill="currentColor">
                    <path
                      d="m7.881 6.501 4.834-4.834c.38-.38.38-1.001 0-1.381s-1.001-.38-1.381 0l-4.834 4.834-4.834-4.835c-.38-.38-1.001-.38-1.381 0s-.38 1.001 0 1.381l4.834 4.834-4.834 4.834c-.38.38-.38 1.001 0 1.381s1.001.38 1.381 0l4.834-4.834 4.834 4.834c.38.38 1.001.38 1.381 0s .38-1.001 0-1.381z">
                    </path>
                  </g>
                </svg></div>
            </div>
          </div>
          <div class="magic-box-suggestions">
            <div class="coveo-magicbox-suggestions" id="coveo-magicbox-suggestions-3fe9180f-1390-4d12-be4a-12c9f53cfd7b" role="listbox" aria-label="Search Suggestions">
              <div role="option"></div>
            </div>
          </div>
        </div>
        <a class="CoveoSearchButton coveo-accessible-button" role="button" aria-label="Search" tabindex="0"><span class="coveo-search-button"><svg focusable="false" enable-background="new 0 0 20 20" viewBox="0 0 20 20" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Search" class="coveo-search-button-svg"><title>Search</title><g fill="currentColor"><path class="coveo-magnifier-circle-svg" d="m8.368 16.736c-4.614 0-8.368-3.754-8.368-8.368s3.754-8.368 8.368-8.368 8.368 3.754 8.368 8.368-3.754 8.368-8.368 8.368m0-14.161c-3.195 0-5.793 2.599-5.793 5.793s2.599 5.793 5.793 5.793 5.793-2.599 5.793-5.793-2.599-5.793-5.793-5.793"></path><path d="m18.713 20c-.329 0-.659-.126-.91-.377l-4.552-4.551c-.503-.503-.503-1.318 0-1.82.503-.503 1.318-.503 1.82 0l4.552 4.551c.503.503.503 1.318 0 1.82-.252.251-.581.377-.91.377"></path></g></svg></span><span class="coveo-search-button-loading"><svg focusable="false" enable-background="new 0 0 18 18" viewBox="0 0 18 18" xmlns="http://www.w3.org/2000/svg" role="img" aria-label="Loading" class="coveo-search-button-loading-svg"><title>Loading</title><g fill="currentColor"><path d="m16.76 8.051c-.448 0-.855-.303-.969-.757-.78-3.117-3.573-5.294-6.791-5.294s-6.01 2.177-6.79 5.294c-.134.537-.679.861-1.213.727-.536-.134-.861-.677-.728-1.212 1.004-4.009 4.594-6.809 8.731-6.809 4.138 0 7.728 2.8 8.73 6.809.135.536-.191 1.079-.727 1.213-.081.02-.162.029-.243.029z"></path><path d="m9 18c-4.238 0-7.943-3.007-8.809-7.149-.113-.541.234-1.071.774-1.184.541-.112 1.071.232 1.184.773.674 3.222 3.555 5.56 6.851 5.56s6.178-2.338 6.852-5.56c.113-.539.634-.892 1.184-.773.54.112.887.643.773 1.184-.866 4.142-4.57 7.149-8.809 7.149z"></path></g></svg></span></a>
      </div>
    </div>
    <div aria-live="polite" class="coveo-visible-to-screen-reader-only"></div>
  </div>
  <!-- <input class="td-nav-search__input" name="q" aria-label="Search query input box">
	<button class="td-nav-search__button" aria-label="Submit search" type="submit">
		<svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 128 128" style="enable-background:new 0 0 128 128;" xml:space="preserve">
			<path d="M125.9,115.5L94.5,84.1c0,0,0,0-0.1,0C101,75.3,105,64.4,105,52.6c0-29-23.5-52.5-52.5-52.5S0,23.6,0,52.6 s23.5,52.5,52.5,52.5c12,0,22.9-4,31.8-10.8c0,0,0,0,0,0l31.4,31.4c2.8,2.8,7.4,2.8,10.2,0C128.7,122.9,128.7,118.3,125.9,115.5z M52.5,90.6c-21,0-38-17-38-38c0-21,17-38,38-38s38,17,38,38C90.5,73.6,73.5,90.6,52.5,90.6z"/>
		</svg>
	</button> -->
</form>

Text Content

Cookie Notice

This site uses cookies essential to its operation, for analytics, and for
personalized content and ads. By continuing to browse this site, you acknowledge
the use of cookies. Privacy statement


Close
Cookie Settings


 * Your Privacy

 * Strictly Necessary Cookies

 * Performance Cookies

 * Functional Cookies

 * Targeting Cookies

 * Privacy Statement

Privacy Preference Center

Active

Always Active



Save Settings

Allow All




 1. Home

   
 * Products
   
 * Releases
   
 * Best Practices
   
 * Resources
   
 * By Type
   

EN
Location
 * Documentation Home
 * Palo Alto Networks
 * Support
 * Live Community
 * Knowledge Base

Products Releases Best Practices Resources By Type
Network Security
Next-Generation Firewall
PAN-OS AIOps for NGFW Firewalls SD-WAN Service Provider
Cloud-Delivered Security Services
DNS Security Advanced WildFire Advanced Threat Prevention Advanced URL Filtering
Enterprise Data Loss Prevention SaaS Security IoT Security
Common Services
License Activation & Subscription Management Tenant Management Identity & Access
Management Device Associations FAQ
Cloud NGFW for AWS Cloud NGFW for Azure CN-Series Panorama VM-Series
GlobalProtect Cloud Identity Engine Strata Cloud Manager
Secure Access Service Edge
Common Services
License Activation & Subscription Management Tenant Management Identity & Access
Management Device Associations FAQ
Prisma Access
Activity Autonomous DEM Prisma Access Insights
Remote Browser Isolation Next-Generation CASB Strata Multitenant Cloud Manager
Prisma SD-WAN
ION Devices
Strata Cloud Manager
Cloud-Native Security
Prisma Cloud
Security Operations
Cortex Data Lake Cortex XDR Cortex XSOAR Cortex XPANSE Cortex XSIAM AutoFocus
All Release Notes
View All Release Notes
Recently Updated Release Notes
Prisma Access Release Notes (Panorama Managed) (3.2 Preferred and Innovation)
NGFW Release Notes (Cloud Management and AIOps for NGFW) Strata Cloud Manager
Release Notes PAN-OS Release Notes (PAN-OS 10.2) VM-Series and Panorama Plugins
Release Notes GlobalProtect™ App Release Notes (6.1) GlobalProtect™ App Release
Notes (5.1) On-Premises Controller for Prisma SD-WAN Release Notes Prisma SD-WAN
Release Notes GlobalProtect™ App Release Notes (6.0)
See All Recently Updated Release Notes
Recently Updated Documentation
Prisma Access Release Notes (5.0 Preferred and Innovation) Strata Multitenant
Cloud Manager Prisma Access Release Notes (4.1 Preferred) Prisma Access Release
Notes (4.0 Preferred) Cortex Data Lake VM-Series Deployment Guide (10.2) NGFW
AIOps (AIOps for NGFW with Strata Cloud Manager) Prisma SD-WAN Administrator’s
Guide Prisma Access Administration (4.0 & Later) What's New in the NetSec
Platform
See All Recent Updates
Applications and Threats Content Updates
Best Practices for Migrating to Application-Based Policy
Data Center
Decryption
DoS and Zone
Get Started
Internet Gateway Security Policy
Secure Administrative Access
Security Policy
WildFire
Zero Trust
VIEW ALL
All Release Notes
Blog
Compatibility Matrix
Experts Corner
Infographics
Licensing, Registration, and Activation
OSS Listings
Translated Documents
VIEW ALL
API Documentation
Release Notes
PAN-OS® Administrator’s Guide
 * PAN-OS® Administrator’s Guide
 * All Documentation

>
Clear

SearchLoading


Clear
See the New and Modified App-IDs in a Content Release
Updated on
Tue Jan 23 00:02:49 UTC 2024
Focus

Download PDF


Filter

Expand All | Collapse All


NEXT-GENERATION FIREWALL DOCS

--------------------------------------------------------------------------------

 * 
   Getting Started
   * Cloud Management and AIOps for NGFW
   * Free and Premium Features
   * How to Activate AIOps for NGFW
   * Where Are My AIOps for NGFW Features?
 * 
   Administration
   Version
   PAN-OS 10.2
    * Cloud Management of NGFWs
    * PAN-OS 10.0 (EoL)
    * PAN-OS 10.1
    * PAN-OS 10.2
    * PAN-OS 11.0
    * PAN-OS 11.1
    * PAN-OS 9.1
   
   * Getting Started
     * Integrate the Firewall into Your Management Network
       * Determine Your Access Strategy for Business Continuity
       * Determine Your Management Strategy
       * Perform Initial Configuration
       * Perform Initial Configuration for an Air Gapped Firewall
       * Set Up Network Access for External Services
     * Register the Firewall
     * Segment Your Network Using Interfaces and Zones
       * Network Segmentation for a Reduced Attack Surface
       * Configure Interfaces and Zones
     * Set Up a Basic Security Policy
     * Assess Network Traffic
     * Enable Free WildFire Forwarding
     * Best Practices for Completing the Firewall Deployment
   * Subscriptions
     * Subscriptions You Can Use With the Firewall
     * Activate Subscription Licenses
     * What Happens When Licenses Expire?
     * Enhanced Application Logs for Palo Alto Networks Cloud Services
   * Firewall Administration
     * Management Interfaces
     * Use the Web Interface
       * Launch the Web Interface
       * Configure Banners, Message of the Day, and Logos
       * Use the Administrator Login Activity Indicators to Detect Account
         Misuse
       * Manage and Monitor Administrative Tasks
       * Commit, Validate, and Preview Firewall Configuration Changes
       * Commit Selective Configuration Changes
       * Export Configuration Table Data
       * Use Global Find to Search the Firewall or Panorama Management Server
       * Manage Locks for Restricting Configuration Changes
     * Manage Configuration Backups
       * Save and Export Firewall Configurations
       * Revert Firewall Configuration Changes
     * Manage Firewall Administrators
       * Administrative Role Types
       * Configure an Admin Role Profile
       * Administrative Authentication
       * Configure Administrative Accounts and Authentication
         * Configure a Firewall Administrator Account
         * Configure Local or External Authentication for Firewall
           Administrators
         * Configure Certificate-Based Administrator Authentication to the Web
           Interface
         * Configure SSH Key-Based Administrator Authentication to the CLI
         * Configure API Key Lifetime
       * Configure Tracking of Administrator Activity
     * Reference: Web Interface Administrator Access
       * Web Interface Access Privileges
         * Define Access to the Web Interface Tabs
         * Provide Granular Access to the Monitor Tab
         * Provide Granular Access to the Policy Tab
         * Provide Granular Access to the Objects Tab
         * Provide Granular Access to the Network Tab
         * Provide Granular Access to the Device Tab
         * Define User Privacy Settings in the Admin Role Profile
         * Restrict Administrator Access to Commit and Validate Functions
         * Provide Granular Access to Global Settings
         * Provide Granular Access to the Panorama Tab
         * Provide Granular Access to Operations Settings
       * Panorama Web Interface Access Privileges
     * Reference: Port Number Usage
       * Ports Used for Management Functions
       * Ports Used for HA
       * Ports Used for Panorama
       * Ports Used for GlobalProtect
       * Ports Used for User-ID
       * Ports Used for IPSec
       * Ports Used for Routing
       * Ports Used for DHCP
       * Ports Used for Infrastructure
     * Reset the Firewall to Factory Default Settings
     * Bootstrap the Firewall
       * USB Flash Drive Support
       * Sample init-cfg.txt Files
       * Prepare a USB Flash Drive for Bootstrapping a Firewall
       * Bootstrap a Firewall Using a USB Flash Drive
   * Device Telemetry
     * Device Telemetry Overview
     * Device Telemetry Collection and Transmission Intervals
     * Manage Device Telemetry
       * Enable Device Telemetry
       * Disable Device Telemetry
       * Enable Service Routes for Telemetry
       * Manage the Data the Device Telemetry Collects
       * Manage Historical Device Telemetry
     * Monitor Device Telemetry
     * Sample the Data that Device Telemetry Collects
   * Authentication
     * Authentication Types
       * External Authentication Services
       * Multi-Factor Authentication
       * SAML
       * Kerberos
       * TACACS+
       * RADIUS
       * LDAP
       * Local Authentication
     * Plan Your Authentication Deployment
     * Configure Multi-Factor Authentication
       * Configure MFA Between RSA SecurID and the Firewall
       * Configure MFA Between Okta and the Firewall
       * Configure MFA Between Duo and the Firewall
     * Configure SAML Authentication
     * Configure Kerberos Single Sign-On
     * Configure Kerberos Server Authentication
     * Configure TACACS+ Authentication
     * Configure RADIUS Authentication
     * Configure LDAP Authentication
     * Connection Timeouts for Authentication Servers
       * Guidelines for Setting Authentication Server Timeouts
       * Modify the PAN-OS Web Server Timeout
       * Modify the Authentication Portal Session Timeout
     * Configure Local Database Authentication
     * Configure an Authentication Profile and Sequence
     * Test Authentication Server Connectivity
     * Authentication Policy
       * Authentication Timestamps
       * Configure Authentication Policy
     * Troubleshoot Authentication Issues
   * Certificate Management
     * Keys and Certificates
     * Default Trusted Certificate Authorities (CAs)
     * Certificate Revocation
       * Certificate Revocation List (CRL)
       * Online Certificate Status Protocol (OCSP)
     * Certificate Deployment
     * Set Up Verification for Certificate Revocation Status
       * Configure an OCSP Responder
       * Configure Revocation Status Verification of Certificates
       * Configure Revocation Status Verification of Certificates Used for
         SSL/TLS Decryption
     * Configure the Master Key
     * Master Key Encryption
       * Configure Master Key Encryption Level
       * Master Key Encryption on a Firewall HA Pair
       * Master Key Encryption Logs
       * Unique Master Key Encryptions for AES-256-GCM
     * Obtain Certificates
       * Create a Self-Signed Root CA Certificate
       * Generate a Certificate
       * Import a Certificate and Private Key
       * Obtain a Certificate from an External CA
       * Install a Device Certificate
       * Restore an Expired Device Certificate
       * Deploy Certificates Using SCEP
     * Export a Certificate and Private Key
     * Configure a Certificate Profile
     * Configure an SSL/TLS Service Profile
     * Configure an SSH Service Profile
     * Replace the Certificate for Inbound Management Traffic
     * Configure the Key Size for SSL Forward Proxy Server Certificates
     * Revoke and Renew Certificates
       * Revoke a Certificate
       * Renew a Certificate
     * Secure Keys with a Hardware Security Module
       * Set Up Connectivity with an HSM
         * Set Up Connectivity with a SafeNet Network HSM
         * Set Up Connectivity with an nCipher nShield Connect HSM
       * Encrypt a Master Key Using an HSM
         * Encrypt the Master Key
         * Refresh the Master Key Encryption
       * Store Private Keys on an HSM
       * Manage the HSM Deployment
   * High Availability
     * HA Overview
     * HA Concepts
       * HA Modes
       * HA Links and Backup Links
         * HA Ports on Palo Alto Networks Firewalls
       * Device Priority and Preemption
       * Failover
       * LACP and LLDP Pre-Negotiation for Active/Passive HA
       * Floating IP Address and Virtual MAC Address
       * ARP Load-Sharing
       * Route-Based Redundancy
       * HA Timers
       * Session Owner
       * Session Setup
       * NAT in Active/Active HA Mode
       * ECMP in Active/Active HA Mode
     * Set Up Active/Passive HA
       * Prerequisites for Active/Passive HA
       * Configuration Guidelines for Active/Passive HA
       * Configure Active/Passive HA
       * Define HA Failover Conditions
       * Verify Failover
     * Set Up Active/Active HA
       * Prerequisites for Active/Active HA
       * Configure Active/Active HA
       * Determine Your Active/Active Use Case
         * Use Case: Configure Active/Active HA with Route-Based Redundancy
         * Use Case: Configure Active/Active HA with Floating IP Addresses
         * Use Case: Configure Active/Active HA with ARP Load-Sharing
         * Use Case: Configure Active/Active HA with Floating IP Address Bound
           to Active-Primary Firewall
         * Use Case: Configure Active/Active HA with Source DIPP NAT Using
           Floating IP Addresses
         * Use Case: Configure Separate Source NAT IP Address Pools for
           Active/Active HA Firewalls
         * Use Case: Configure Active/Active HA for ARP Load-Sharing with
           Destination NAT
         * Use Case: Configure Active/Active HA for ARP Load-Sharing with
           Destination NAT in Layer 3
     * HA Clustering Overview
     * HA Clustering Best Practices and Provisioning
     * Configure HA Clustering
     * Refresh HA1 SSH Keys and Configure Key Options
     * HA Firewall States
     * Reference: HA Synchronization
   * Monitoring
     * Use the Dashboard
     * Use the Application Command Center
       * ACC—First Look
       * ACC Tabs
       * ACC Widgets
       * Widget Descriptions
       * ACC Filters
       * Interact with the ACC
       * Use Case: ACC—Path of Information Discovery
     * Use the App Scope Reports
       * Summary Report
       * Change Monitor Report
       * Threat Monitor Report
       * Threat Map Report
       * Network Monitor Report
       * Traffic Map Report
     * Use the Automated Correlation Engine
       * Automated Correlation Engine Concepts
         * Correlation Object
         * Correlated Events
       * View the Correlated Objects
       * Interpret Correlated Events
       * Use the Compromised Hosts Widget in the ACC
     * Take Packet Captures
       * Types of Packet Captures
       * Disable Hardware Offload
       * Take a Custom Packet Capture
       * Take a Threat Packet Capture
       * Take an Application Packet Capture
         * Take a Packet Capture for Unknown Applications
         * Take a Custom Application Packet Capture
       * Take a Packet Capture on the Management Interface
     * Monitor Applications and Threats
     * View and Manage Logs
       * Log Types and Severity Levels
         * Traffic Logs
         * Threat Logs
         * URL Filtering Logs
         * WildFire Submissions Logs
         * Data Filtering Logs
         * Correlation Logs
         * Tunnel Inspection Logs
         * Config Logs
         * System Logs
         * HIP Match Logs
         * GlobalProtect Logs
         * IP-Tag Logs
         * User-ID Logs
         * Decryption Logs
         * Alarms Logs
         * Authentication Logs
         * Unified Logs
       * View Logs
       * Filter Logs
       * Export Logs
       * Use Case: Export Traffic Logs for a Date Range
       * Configure Log Storage Quotas and Expiration Periods
       * Schedule Log Exports to an SCP or FTP Server
     * Monitor Block List
     * View and Manage Reports
       * Report Types
       * View Reports
       * Configure the Expiration Period and Run Time for Reports
       * Disable Predefined Reports
       * Custom Reports
       * Generate Custom Reports
       * Generate Botnet Reports
         * Configure a Botnet Report
         * Interpret Botnet Report Output
       * Generate the SaaS Application Usage Report
       * Manage PDF Summary Reports
       * Generate User/Group Activity Reports
       * Manage Report Groups
       * Schedule Reports for Email Delivery
       * Manage Report Storage Capacity
     * View Policy Rule Usage
     * Use External Services for Monitoring
     * Configure Log Forwarding
     * Configure Email Alerts
     * Use Syslog for Monitoring
       * Configure Syslog Monitoring
       * Syslog Field Descriptions
         * Traffic Log Fields
         * Threat Log Fields
         * URL Filtering Log Fields
         * Data Filtering Log Fields
         * HIP Match Log Fields
         * GlobalProtect Log Fields
         * IP-Tag Log Fields
         * User-ID Log Fields
         * Decryption Log Fields
         * Tunnel Inspection Log Fields
         * SCTP Log Fields
         * Authentication Log Fields
         * Config Log Fields
         * System Log Fields
         * Correlated Events Log Fields
         * GTP Log Fields
         * Audit Log Fields
         * Syslog Severity
         * Custom Log/Event Format
         * Escape Sequences
     * SNMP Monitoring and Traps
       * SNMP Support
       * Use an SNMP Manager to Explore MIBs and Objects
         * Identify a MIB Containing a Known OID
         * Walk a MIB
         * Identify the OID for a System Statistic or Trap
       * Enable SNMP Services for Firewall-Secured Network Elements
       * Monitor Statistics Using SNMP
       * Forward Traps to an SNMP Manager
       * Supported MIBs
         * MIB-II
         * IF-MIB
         * HOST-RESOURCES-MIB
         * ENTITY-MIB
         * ENTITY-SENSOR-MIB
         * ENTITY-STATE-MIB
         * IEEE 802.3 LAG MIB
         * LLDP-V2-MIB.my
         * BFD-STD-MIB
         * PAN-COMMON-MIB.my
         * PAN-GLOBAL-REG-MIB.my
         * PAN-GLOBAL-TC-MIB.my
         * PAN-LC-MIB.my
         * PAN-PRODUCT-MIB.my
         * PAN-ENTITY-EXT-MIB.my
         * PAN-TRAPS.my
     * Forward Logs to an HTTP/S Destination
     * NetFlow Monitoring
       * Configure NetFlow Exports
       * NetFlow Templates
     * Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
     * Monitor Transceivers
   * User-ID
     * User-ID Overview
     * User-ID Concepts
       * Group Mapping
       * User Mapping
         * Server Monitoring
         * Port Mapping
         * XFF Headers
         * Username Header Insertion
         * Authentication Policy and Authentication Portal
         * Syslog
         * GlobalProtect
         * XML API
         * Client Probing
     * Enable User-ID
     * Map Users to Groups
     * Map IP Addresses to Users
       * Create a Dedicated Service Account for the User-ID Agent
       * Configure User Mapping Using the Windows User-ID Agent
         * Install the Windows-Based User-ID Agent
         * Configure the Windows User-ID Agent for User Mapping
       * Configure User Mapping Using the PAN-OS Integrated User-ID Agent
       * Configure Server Monitoring Using WinRM
       * Configure User-ID to Monitor Syslog Senders for User Mapping
         * Configure the PAN-OS Integrated User-ID Agent as a Syslog Listener
         * Configure the Windows User-ID Agent as a Syslog Listener
       * Map IP Addresses to Usernames Using Authentication Portal
         * Authentication Portal Authentication Methods
         * Authentication Portal Modes
         * Configure Authentication Portal
       * Configure User Mapping for Terminal Server Users
         * Configure the Palo Alto Networks Terminal Server (TS) Agent for User
           Mapping
         * Retrieve User Mappings from a Terminal Server Using the PAN-OS XML
           API
       * Send User Mappings to User-ID Using the XML API
     * Enable User- and Group-Based Policy
     * Enable Policy for Users with Multiple Accounts
     * Verify the User-ID Configuration
     * Deploy User-ID in a Large-Scale Network
       * Deploy User-ID for Numerous Mapping Information Sources
         * Windows Log Forwarding and Global Catalog Servers
         * Plan a Large-Scale User-ID Deployment
         * Configure Windows Log Forwarding
         * Configure User-ID for Numerous Mapping Information Sources
       * Insert Username in HTTP Headers
       * Redistribute Data and Authentication Timestamps
         * Firewall Deployment for Data Redistribution
         * Configure Data Redistribution
       * Share User-ID Mappings Across Virtual Systems
   * App-ID
     * App-ID Overview
     * Streamlined App-ID Policy Rules
       * Create an Application Filter Using Tags
       * Create an Application Filter Based on Custom Tags
     * App-ID and HTTP/2 Inspection
     * Manage Custom or Unknown Applications
     * Manage New and Modified App-IDs
       * Workflow to Best Incorporate New and Modified App-IDs
       * See the New and Modified App-IDs in a Content Release
       * See How New and Modified App-IDs Impact Your Security Policy
       * Ensure Critical New App-IDs are Allowed
       * Monitor New App-IDs
       * Disable and Enable App-IDs
     * Use Application Objects in Policy
       * Create an Application Group
       * Create an Application Filter
       * Create a Custom Application
       * Resolve Application Dependencies
     * Safely Enable Applications on Default Ports
     * Applications with Implicit Support
     * Security Policy Rule Optimization
       * Policy Optimizer Concepts
         * Sorting and Filtering Security Policy Rules
         * Clear Application Usage Data
       * Migrate Port-Based to App-ID Based Security Policy Rules
       * Rule Cloning Migration Use Case: Web Browsing and SSL Traffic
       * Add Applications to an Existing Rule
       * Identify Security Policy Rules with Unused Applications
       * High Availability for Application Usage Statistics
       * How to Disable Policy Optimizer
     * App-ID Cloud Engine
       * Prepare to Deploy App-ID Cloud Engine
       * Enable or Disable the App-ID Cloud Engine
       * App-ID Cloud Engine Processing and Policy Usage
       * New App Viewer (Policy Optimizer)
       * Add Apps to an Application Filter with Policy Optimizer
       * Add Apps to an Application Group with Policy Optimizer
       * Add Apps Directly to a Rule with Policy Optimizer
       * Replace an RMA Firewall (ACE)
       * Impact of License Expiration or Disabling ACE
       * Commit Failure Due to Cloud Content Rollback
       * Troubleshoot App-ID Cloud Engine
     * SaaS App-ID Policy Recommendation
       * Import SaaS Policy Recommendation
       * Import Updated SaaS Policy Recommendation
       * Remove Deleted SaaS Policy Recommendation
     * Application Level Gateways
     * Disable the SIP Application-level Gateway (ALG)
     * Use HTTP Headers to Manage SaaS Application Access
       * Understand SaaS Custom Headers
       * Domains used by the Predefined SaaS Application Types
       * Create HTTP Header Insertion Entries using Predefined Types
       * Create Custom HTTP Header Insertion Entries
     * Maintain Custom Timeouts for Data Center Applications
   * Device-ID
     * Device-ID Overview
     * Prepare to Deploy Device-ID
     * Configure Device-ID
     * Manage Device-ID
     * CLI Commands for Device-ID
   * Decryption
     * Decryption Overview
     * Decryption Concepts
       * Keys and Certificates for Decryption Policies
       * SSL Forward Proxy
       * SSL Forward Proxy Decryption Profile
       * SSL Inbound Inspection
       * SSL Inbound Inspection Decryption Profile
       * SSL Protocol Settings Decryption Profile
       * SSH Proxy
       * SSH Proxy Decryption Profile
       * Profile for No Decryption
       * SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
       * Perfect Forward Secrecy (PFS) Support for SSL Decryption
       * SSL Decryption and Subject Alternative Names (SANs)
       * TLSv1.3 Decryption
       * High Availability Not Supported for Decrypted Sessions
       * Decryption Mirroring
     * Prepare to Deploy Decryption
       * Work with Stakeholders to Develop a Decryption Deployment Strategy
       * Develop a PKI Rollout Plan
       * Size the Decryption Firewall Deployment
       * Plan a Staged, Prioritized Deployment
     * Define Traffic to Decrypt
       * Create a Decryption Profile
       * Create a Decryption Policy Rule
     * Configure SSL Forward Proxy
     * Configure SSL Inbound Inspection
     * Configure SSH Proxy
     * Configure Server Certificate Verification for Undecrypted Traffic
     * Decryption Exclusions
       * Palo Alto Networks Predefined Decryption Exclusions
       * Exclude a Server from Decryption for Technical Reasons
       * Local Decryption Exclusion Cache
       * Create a Policy-Based Decryption Exclusion
     * Block Private Key Export
       * Generate a Private Key and Block It
       * Import a Private Key and Block It
       * Import a Private Key for IKE Gateway and Block It
       * Verify Private Key Blocking
     * Enable Users to Opt Out of SSL Decryption
     * Temporarily Disable SSL Decryption
     * Configure Decryption Port Mirroring
     * Verify Decryption
     * Troubleshoot and Monitor Decryption
       * Decryption Application Command Center Widgets
       * Decryption Log
         * Configure Decryption Logging
         * Decryption Log Errors, Error Indexes, and Bitmasks
         * Repair Incomplete Certificate Chains
       * Custom Report Templates for Decryption
       * Unsupported Parameters by Proxy Type and TLS Version
       * Decryption Troubleshooting Workflow Examples
         * Investigate Decryption Failure Reasons
         * Troubleshoot Unsupported Cipher Suites
         * Identify Weak Protocols and Cipher Suites
         * Identify Untrusted CA Certificates
         * Troubleshoot Expired Certificates
         * Troubleshoot Revoked Certificates
         * Troubleshoot Pinned Certificates
     * Activate Free Licenses for Decryption Features
   * Quality of Service
     * QoS Overview
     * QoS Concepts
       * QoS for Applications and Users
       * QoS Policy
       * QoS Profile
       * QoS Classes
       * QoS Priority Queuing
       * QoS Bandwidth Management
       * QoS Egress Interface
       * QoS for Clear Text and Tunneled Traffic
     * Configure QoS
     * Configure Lockless QoS
     * Configure QoS for a Virtual System
     * Enforce QoS Based on DSCP Classification
     * QoS Use Cases
       * Use Case: QoS for a Single User
       * Use Case: QoS for Voice and Video Applications
   * VPNs
     * VPN Deployments
     * Site-to-Site VPN Overview
     * Site-to-Site VPN Concepts
       * IKE Gateway
       * Tunnel Interface
       * Tunnel Monitoring
       * Internet Key Exchange (IKE) for VPN
         * IKE Phase 1
         * IKE Phase 2
         * Methods of Securing IPSec VPN Tunnels (IKE Phase 2)
       * IKEv2
         * Liveness Check
         * Cookie Activation Threshold and Strict Cookie Validation
         * Traffic Selectors
         * Hash and URL Certificate Exchange
         * SA Key Lifetime and Re-Authentication Interval
     * Set Up Site-to-Site VPN
       * Set Up an IKE Gateway
         * Export a Certificate for a Peer to Access Using Hash and URL
         * Import a Certificate for IKEv2 Gateway Authentication
         * Change the Key Lifetime or Authentication Interval for IKEv2
         * Change the Cookie Activation Threshold for IKEv2
         * Configure IKEv2 Traffic Selectors
       * Define Cryptographic Profiles
         * Define IKE Crypto Profiles
         * Define IPSec Crypto Profiles
       * Set Up an IPSec Tunnel
       * Set Up Tunnel Monitoring
         * Define a Tunnel Monitoring Profile
         * View the Status of the Tunnels
       * Enable/Disable, Refresh or Restart an IKE Gateway or IPSec Tunnel
         * Enable or Disable an IKE Gateway or IPSec Tunnel
         * Refresh and Restart Behaviors
         * Refresh or Restart an IKE Gateway or IPSec Tunnel
       * Test VPN Connectivity
       * Interpret VPN Error Messages
     * Site-to-Site VPN Quick Configs
       * Site-to-Site VPN with Static Routing
       * Site-to-Site VPN with OSPF
       * Site-to-Site VPN with Static and Dynamic Routing
   * Large Scale VPN (LSVPN)
     * LSVPN Overview
     * Create Interfaces and Zones for the LSVPN
     * Enable SSL Between GlobalProtect LSVPN Components
       * About Certificate Deployment
       * Deploy Server Certificates to the GlobalProtect LSVPN Components
       * Deploy Client Certificates to the GlobalProtect Satellites Using SCEP
     * Configure the Portal to Authenticate Satellites
     * Configure GlobalProtect Gateways for LSVPN
     * Configure the GlobalProtect Portal for LSVPN
       * GlobalProtect Portal for LSVPN Prerequisite Tasks
       * Configure the Portal
       * Define the Satellite Configurations
     * Prepare the Satellite to Join the LSVPN
     * Verify the LSVPN Configuration
     * LSVPN Quick Configs
       * Basic LSVPN Configuration with Static Routing
       * Advanced LSVPN Configuration with Dynamic Routing
       * Advanced LSVPN Configuration with iBGP
   * Policy
     * Policy Types
     * Security Policy
       * Components of a Security Policy Rule
       * Security Policy Actions
       * Create a Security Policy Rule
     * Policy Objects
     * Security Profiles
       * Create a Security Profile Group
       * Set Up or Override a Default Security Profile Group
       * Data Filtering
         * Create a Data Filtering Profile
         * Predefined Data Filtering Patterns
       * Set Up File Blocking
     * Track Rules Within a Rulebase
     * Enforce Policy Rule Description, Tag, and Audit Comment
     * Move or Clone a Policy Rule or Object to a Different Virtual System
     * Use an Address Object to Represent IP Addresses
       * Address Objects
       * Create an Address Object
     * Use Tags to Group and Visually Distinguish Objects
       * Create and Apply Tags
       * Modify Tags
       * View Rules by Tag Group
       * Tag Browser
     * Use an External Dynamic List in Policy
       * External Dynamic List
       * Formatting Guidelines for an External Dynamic List
         * IP Address List
         * Domain List
         * URL List
       * Built-in External Dynamic Lists
       * Configure the Firewall to Access an External Dynamic List
       * Configure the Firewall to Access an External Dynamic List from the EDL
         Hosting Service
         * Create an External Dynamic List Using the EDL Hosting Service
         * Convert the GlobalSign Root R1 Certificate to PEM Format
       * Retrieve an External Dynamic List from the Web Server
       * View External Dynamic List Entries
       * Exclude Entries from an External Dynamic List
       * Enforce Policy on an External Dynamic List
       * Find External Dynamic Lists That Failed Authentication
       * Disable Authentication for an External Dynamic List
     * Register IP Addresses and Tags Dynamically
     * Use Dynamic User Groups in Policy
     * Use Auto-Tagging to Automate Security Actions
     * Monitor Changes in the Virtual Environment
       * Enable VM Monitoring to Track Changes on the Virtual Network
       * Attributes Monitored on Virtual Machines in Cloud Platforms
       * Use Dynamic Address Groups in Policy
     * CLI Commands for Dynamic IP Addresses and Tags
     * Enforce Policy on Endpoints and Users Behind an Upstream Device
       * Use XFF Values for Policy Based on Source Users
       * Use XFF IP Address Values in Security Policy and Logging
       * Use the IP Address in the XFF Header to Troubleshoot Events
     * Policy-Based Forwarding
       * PBF
         * Egress Path and Symmetric Return
         * Path Monitoring for PBF
         * Service Versus Applications in PBF
       * Create a Policy-Based Forwarding Rule
       * Use Case: PBF for Outbound Access with Dual ISPs
     * Application Override Policy
     * Test Policy Rules
   * Virtual Systems
     * Virtual Systems Overview
       * Virtual System Components and Segmentation
       * Benefits of Virtual Systems
       * Use Cases for Virtual Systems
       * Platform Support and Licensing for Virtual Systems
       * Administrative Roles for Virtual Systems
       * Shared Objects for Virtual Systems
     * Communication Between Virtual Systems
       * Inter-VSYS Traffic That Must Leave the Firewall
       * Inter-VSYS Traffic That Remains Within the Firewall
         * External Zone
         * External Zones and Security Policies For Traffic Within a Firewall
       * Inter-VSYS Communication Uses Two Sessions
     * Shared Gateway
       * External Zones and Shared Gateway
       * Networking Considerations for a Shared Gateway
     * Configure Virtual Systems
     * Configure Inter-Virtual System Communication within the Firewall
     * Configure a Shared Gateway
     * Customize Service Routes for a Virtual System
       * Customize Service Routes to Services for Virtual Systems
       * Configure a PA-7000 Series Firewall for Logging Per Virtual System
         * Configure a PA-7000 Series LPC for Logging per Virtual System
         * Configure a PA-7000 Series LFC for Logging per Virtual System
       * Configure Administrative Access Per Virtual System or Firewall
     * Virtual System Functionality with Other Features
   * Zone Protection and DoS Protection
     * Network Segmentation Using Zones
     * How Do Zones Protect the Network?
     * Zone Defense
       * Zone Defense Tools
       * How Do the Zone Defense Tools Work?
       * Firewall Placement for DoS Protection
       * Baseline CPS Measurements for Setting Flood Thresholds
         * CPS Measurements to Take
         * How to Measure CPS
       * Zone Protection Profiles
         * Flood Protection
         * Reconnaissance Protection
         * Packet-Based Attack Protection
         * Protocol Protection
         * Ethernet SGT Protection
       * Packet Buffer Protection
       * DoS Protection Profiles and Policy Rules
         * Classified Versus Aggregate DoS Protection
         * DoS Protection Profiles
         * DoS Protection Policy Rules
     * Configure Zone Protection to Increase Network Security
       * Configure Reconnaissance Protection
       * Configure Packet Based Attack Protection
       * Configure Protocol Protection
         * Use Case: Non-IP Protocol Protection Between Security Zones on Layer
           2 Interfaces
         * Use Case: Non-IP Protocol Protection Within a Security Zone on Layer
           2 Interfaces
       * Configure Packet Buffer Protection
       * Configure Packet Buffer Protection Based on Latency
       * Configure Ethernet SGT Protection
     * DoS Protection Against Flooding of New Sessions
       * Multiple-Session DoS Attack
       * Single-Session DoS Attack
       * Configure DoS Protection Against Flooding of New Sessions
       * End a Single Session DoS Attack
       * Identify Sessions That Use Too Much of the On-Chip Packet Descriptor
       * Discard a Session Without a Commit
   * Certifications
     * Enable FIPS and Common Criteria Support
       * Access the Maintenance Recovery Tool (MRT)
       * Change the Operational Mode to FIPS-CC Mode
     * FIPS-CC Security Functions
     * Scrub the Swap Memory on Firewalls or Appliances Running in FIPS-CC Mode
 * 
   Networking
   Version
   PAN-OS 10.1
    * PAN-OS 10.1
    * PAN-OS 10.2
    * PAN-OS 11.0
    * PAN-OS 11.1
   
   * Networking
     * Networking Introduction
   * Configure Interfaces
     * Tap Interfaces
     * Virtual Wire Interfaces
       * Layer 2 and Layer 3 Packets over a Virtual Wire
       * Port Speeds of Virtual Wire Interfaces
       * LLDP over a Virtual Wire
       * Aggregated Interfaces for a Virtual Wire
       * Virtual Wire Support of High Availability
       * Zone Protection for a Virtual Wire Interface
       * VLAN-Tagged Traffic
       * Virtual Wire Subinterfaces
       * Configure Virtual Wires
     * Layer 2 Interfaces
       * Layer 2 Interfaces with No VLANs
       * Layer 2 Interfaces with VLANs
       * Configure a Layer 2 Interface
       * Configure a Layer 2 Interface, Subinterface, and VLAN
       * Manage Per-VLAN Spanning Tree (PVST+) BPDU Rewrite
     * Layer 3 Interfaces
       * Configure Layer 3 Interfaces
       * Manage IPv6 Hosts Using NDP
         * IPv6 Router Advertisements for DNS Configuration
         * Configure RDNS Servers and DNS Search List for IPv6 Router
           Advertisements
         * NDP Monitoring
         * Enable NDP Monitoring
     * Configure an Aggregate Interface Group
     * Configure Bonjour Reflector for Network Segmentation
     * Use Interface Management Profiles to Restrict Access
   * Virtual Routers
     * Virtual Router Overview
     * Configure Virtual Routers
   * Service Routes
     * Service Routes Overview
     * Configure Service Routes
   * Static Routes
     * Static Route Overview
     * Static Route Removal Based on Path Monitoring
     * Configure a Static Route
     * Configure Path Monitoring for a Static Route
   * RIP
     * RIP Overview
     * Configure RIP
   * OSPF
     * OSPF Concepts
       * OSPFv3
       * OSPF Neighbors
       * OSPF Areas
       * OSPF Router Types
     * Configure OSPF
     * Configure OSPFv3
     * Configure OSPF Graceful Restart
     * Confirm OSPF Operation
       * View the Routing Table
       * Confirm OSPF Adjacencies
       * Confirm that OSPF Connections are Established
   * BGP
     * BGP Overview
     * MP-BGP
     * Configure BGP
     * Configure a BGP Peer with MP-BGP for IPv4 or IPv6 Unicast
     * Configure a BGP Peer with MP-BGP for IPv4 Multicast
     * BGP Confederations
   * IP Multicast
     * IGMP
     * PIM
       * Shortest-Path Tree (SPT) and Shared Tree
       * PIM Assert Mechanism
       * Reverse-Path Forwarding
     * Configure IP Multicast
     * View IP Multicast Information
   * Route Redistribution
     * Route Redistribution Overview
     * Configure Route Redistribution
   * GRE Tunnels
     * GRE Tunnel Overview
     * Create a GRE Tunnel
   * DHCP
     * DHCP Overview
     * Firewall as a DHCP Server and Client
     * DHCP Messages
     * DHCP Addressing
       * DHCP Address Allocation Methods
       * DHCP Leases
     * DHCP Options
       * Predefined DHCP Options
       * Multiple Values for a DHCP Option
       * DHCP Options 43, 55, and 60 and Other Customized Options
     * Configure an Interface as a DHCP Server
     * Configure an Interface as a DHCP Client
     * Configure the Management Interface as a DHCP Client
     * Configure an Interface as a DHCP Relay Agent
     * Monitor and Troubleshoot DHCP
       * View DHCP Server Information
       * Clear DHCP Leases
       * View DHCP Client Information
       * Gather Debug Output about DHCP
   * DNS
     * DNS Overview
     * DNS Proxy Object
     * DNS Server Profile
     * Multi-Tenant DNS Deployments
     * Configure a DNS Proxy Object
     * Configure a DNS Server Profile
     * Use Case 1: Firewall Requires DNS Resolution
     * Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for
       Security Policies, Reporting, and Services within its Virtual System
     * Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
     * DNS Proxy Rule and FQDN Matching
   * DDNS
     * Dynamic DNS Overview
     * Configure Dynamic DNS for Firewall Interfaces
   * NAT
     * NAT Policy Rules
       * NAT Policy Overview
       * NAT Address Pools Identified as Address Objects
       * Proxy ARP for NAT Address Pools
     * Source NAT and Destination NAT
       * Source NAT
       * Destination NAT
       * Destination NAT with DNS Rewrite Use Cases
         * Destination NAT with DNS Rewrite Reverse Use Cases
         * Destination NAT with DNS Rewrite Forward Use Cases
     * NAT Rule Capacities
     * Dynamic IP and Port NAT Oversubscription
     * Dataplane NAT Memory Statistics
     * Configure NAT
       * Translate Internal Client IP Addresses to Your Public IP Address
         (Source DIPP NAT)
       * Enable Clients on the Internal Network to Access your Public Servers
         (Destination U-Turn NAT)
       * Enable Bi-Directional Address Translation for Your Public-Facing
         Servers (Static Source NAT)
       * Configure Destination NAT with DNS Rewrite
       * Configure Destination NAT Using Dynamic IP Addresses
       * Modify the Oversubscription Rate for DIPP NAT
       * Reserve Dynamic IP NAT Addresses
       * Disable NAT for a Specific Host or Interface
     * NAT Configuration Examples
       * Destination NAT Example—One-to-One Mapping
       * Destination NAT with Port Translation Example
       * Destination NAT Example—One-to-Many Mapping
       * Source and Destination NAT Example
       * Virtual Wire Source NAT Example
       * Virtual Wire Static NAT Example
       * Virtual Wire Destination NAT Example
   * NPTv6
     * NPTv6 Overview
       * Unique Local Addresses
       * Reasons to Use NPTv6
     * How NPTv6 Works
       * Checksum-Neutral Mapping
       * Bi-Directional Translation
       * NPTv6 Applied to a Specific Service
     * NDP Proxy
     * NPTv6 and NDP Proxy Example
       * The ND Cache in NPTv6 Example
       * The NDP Proxy in NPTv6 Example
       * The NPTv6 Translation in NPTv6 Example
       * Neighbors in the ND Cache are Not Translated
     * Create an NPTv6 Policy
   * NAT64
     * NAT64 Overview
     * IPv4-Embedded IPv6 Address
     * DNS64 Server
     * Path MTU Discovery
     * IPv6-Initiated Communication
     * Configure NAT64 for IPv6-Initiated Communication
     * Configure NAT64 for IPv4-Initiated Communication
     * Configure NAT64 for IPv4-Initiated Communication with Port Translation
   * ECMP
     * ECMP Load-Balancing Algorithms
     * Configure ECMP on a Virtual Router
     * Enable ECMP for Multiple BGP Autonomous Systems
     * Verify ECMP
   * LLDP
     * LLDP Overview
     * Supported TLVs in LLDP
     * LLDP Syslog Messages and SNMP Traps
     * Configure LLDP
     * View LLDP Settings and Status
     * Clear LLDP Statistics
   * BFD
     * BFD Overview
       * BFD Model, Interface, and Client Support
       * Non-Supported RFC Components of BFD
       * BFD for Static Routes
       * BFD for Dynamic Routing Protocols
     * Configure BFD
     * Reference: BFD Details
   * Session Settings and Timeouts
     * Transport Layer Sessions
     * TCP
       * TCP Half Closed and TCP Time Wait Timers
       * Unverified RST Timer
       * TCP Split Handshake Drop
       * Maximum Segment Size (MSS)
     * UDP
     * ICMP
       * Security Policy Rules Based on ICMP and ICMPv6 Packets
       * ICMPv6 Rate Limiting
     * Control Specific ICMP or ICMPv6 Types and Codes
     * Configure Session Timeouts
     * Configure Session Settings
     * Session Distribution Policies
       * Session Distribution Policy Descriptions
       * Change the Session Distribution Policy and View Statistics
     * Prevent TCP Split Handshake Session Establishment
   * Tunnel Content Inspection
     * Tunnel Content Inspection Overview
     * Configure Tunnel Content Inspection
     * View Inspected Tunnel Activity
     * View Tunnel Information in Logs
     * Create a Custom Report Based on Tagged Tunnel Traffic
     * Tunnel Acceleration Behavior
     * Disable Tunnel Acceleration
   * Network Packet Broker
     * Network Packet Broker Overview
     * How Network Packet Broker Works
     * Prepare to Deploy Network Packet Broker
     * Configure Transparent Bridge Security Chains
     * Configure Routed Layer 3 Security Chains
     * Network Packet Broker HA Support
     * User Interface Changes for Network Packet Broker
     * Limitations of Network Packet Broker
     * Troubleshoot Network Packet Broker
 * 
   AIOps
   * AIOps for NGFW
     * Regions for AIOps for NGFW
     * Free and Premium Features
     * How to Activate AIOps for NGFW
     * Where Are My AIOps for NGFW Features?
     * Panorama CloudConnector Plugin
     * Get Alert Notifications
     * Export Metadata for Troubleshooting
     * Troubleshoot NGFW Connectivity and Policy Enforcement Anomalies
   * Device Telemetry for AIOps for NGFW
     * Enable Telemetry on Devices
     * Domains Required for AIOps for NGFW
   * Utilize Activity Dashboards
     * Monitor Threats
     * View Executive Summary
     * Monitor Application Usage
     * Monitor User Activity
     * Monitor WildFire
     * Monitor DNS Security
     * Monitor Advanced Threat Prevention
     * Monitor Data Loss Prevention
   * Optimize Security Posture
     * Monitor Security Posture Insights
     * Monitor Feature Adoption
     * Monitor Feature Configuration
     * Monitor Security Advisories
     * Monitor Security Subscriptions
     * Assess Vulnerabilities
     * Build a Custom Dashboard
     * Monitor Compliance Summary
     * Configure Security Checks And Other Posture Settings
     * Proactively Enforce Security Checks
     * Policy Analyzer
       * Pre-Change Policy Analysis
       * Pre-Change Policy Analysis Reports
       * Post-Change Policy Analysis
   * NGFW Health and Software Management
     * View Network Usage
     * View Device Health
     * Get Upgrade Recommendations
     * Analyze Metric Capacity
   * Best Practices in NGFWs
     * On-Demand BPA Report
       * Generate Your BPA & Adoption Summary Report, On Demand
     * Best Practices
 * 
   Incidents & Alerts
   * Alerts
     * Manage Alerts
     * View Alert Details
     * View Probable Causes
     * Forecasting and Anomaly Detection
     * Manage Capacity Analyzer Alerts
     * CPU Usage Metrics in AIOps for NGFW
     * Create a Notification Rule
       * Integrating with ServiceNow
   * AIOps for NGFW Alerts Reference
     * Premium Health Alerts
     * Free Health Alerts
     * Security Posture Alerts
     * Service Alerts
     * Alerts Raised by Leveraging Machine Learning
   * Incidents
     * Manage Incidents
     * View Incident Details
 * 
   Release Notes
   Version
   Cloud Management and AIOps for NGFW
    * Cloud Management and AIOps for NGFW
    * PAN-OS 10.0 (EoL)
    * PAN-OS 10.1
    * PAN-OS 10.2
    * PAN-OS 11.0
    * PAN-OS 11.1
    * PAN-OS 8.1 (EoL)
    * PAN-OS 9.0 (EoL)
    * PAN-OS 9.1
   
   * New Features for AIOps for NGFW
     * New Features in February 2024
     * New Features in December 2023
     * New Features in November 2023
     * New Features in September 2023
     * New Features Through August 2023
   * Known and Addressed Issues
   * Feature History for AIOps for NGFW



Updated on
Tue Jan 23 00:02:49 UTC 2024
Focus

 1. Home
 2. PAN-OS
 3. App-ID
 4. Manage New and Modified App-IDs
 5. See the New and Modified App-IDs in a Content Release

Download PDF



SEE THE NEW AND MODIFIED APP-IDS IN A CONTENT RELEASE

Table of Contents

Filter

Expand All | Collapse All


NEXT-GENERATION FIREWALL DOCS

--------------------------------------------------------------------------------

 * 
   Getting Started
   * Cloud Management and AIOps for NGFW
   * Free and Premium Features
   * How to Activate AIOps for NGFW
   * Where Are My AIOps for NGFW Features?
 * 
   Administration
   Version
   PAN-OS 10.2
    * Cloud Management of NGFWs
    * PAN-OS 10.0 (EoL)
    * PAN-OS 10.1
    * PAN-OS 10.2
    * PAN-OS 11.0
    * PAN-OS 11.1
    * PAN-OS 9.1
   
   * Getting Started
     * Integrate the Firewall into Your Management Network
       * Determine Your Access Strategy for Business Continuity
       * Determine Your Management Strategy
       * Perform Initial Configuration
       * Perform Initial Configuration for an Air Gapped Firewall
       * Set Up Network Access for External Services
     * Register the Firewall
     * Segment Your Network Using Interfaces and Zones
       * Network Segmentation for a Reduced Attack Surface
       * Configure Interfaces and Zones
     * Set Up a Basic Security Policy
     * Assess Network Traffic
     * Enable Free WildFire Forwarding
     * Best Practices for Completing the Firewall Deployment
   * Subscriptions
     * Subscriptions You Can Use With the Firewall
     * Activate Subscription Licenses
     * What Happens When Licenses Expire?
     * Enhanced Application Logs for Palo Alto Networks Cloud Services
   * Firewall Administration
     * Management Interfaces
     * Use the Web Interface
       * Launch the Web Interface
       * Configure Banners, Message of the Day, and Logos
       * Use the Administrator Login Activity Indicators to Detect Account
         Misuse
       * Manage and Monitor Administrative Tasks
       * Commit, Validate, and Preview Firewall Configuration Changes
       * Commit Selective Configuration Changes
       * Export Configuration Table Data
       * Use Global Find to Search the Firewall or Panorama Management Server
       * Manage Locks for Restricting Configuration Changes
     * Manage Configuration Backups
       * Save and Export Firewall Configurations
       * Revert Firewall Configuration Changes
     * Manage Firewall Administrators
       * Administrative Role Types
       * Configure an Admin Role Profile
       * Administrative Authentication
       * Configure Administrative Accounts and Authentication
         * Configure a Firewall Administrator Account
         * Configure Local or External Authentication for Firewall
           Administrators
         * Configure Certificate-Based Administrator Authentication to the Web
           Interface
         * Configure SSH Key-Based Administrator Authentication to the CLI
         * Configure API Key Lifetime
       * Configure Tracking of Administrator Activity
     * Reference: Web Interface Administrator Access
       * Web Interface Access Privileges
         * Define Access to the Web Interface Tabs
         * Provide Granular Access to the Monitor Tab
         * Provide Granular Access to the Policy Tab
         * Provide Granular Access to the Objects Tab
         * Provide Granular Access to the Network Tab
         * Provide Granular Access to the Device Tab
         * Define User Privacy Settings in the Admin Role Profile
         * Restrict Administrator Access to Commit and Validate Functions
         * Provide Granular Access to Global Settings
         * Provide Granular Access to the Panorama Tab
         * Provide Granular Access to Operations Settings
       * Panorama Web Interface Access Privileges
     * Reference: Port Number Usage
       * Ports Used for Management Functions
       * Ports Used for HA
       * Ports Used for Panorama
       * Ports Used for GlobalProtect
       * Ports Used for User-ID
       * Ports Used for IPSec
       * Ports Used for Routing
       * Ports Used for DHCP
       * Ports Used for Infrastructure
     * Reset the Firewall to Factory Default Settings
     * Bootstrap the Firewall
       * USB Flash Drive Support
       * Sample init-cfg.txt Files
       * Prepare a USB Flash Drive for Bootstrapping a Firewall
       * Bootstrap a Firewall Using a USB Flash Drive
   * Device Telemetry
     * Device Telemetry Overview
     * Device Telemetry Collection and Transmission Intervals
     * Manage Device Telemetry
       * Enable Device Telemetry
       * Disable Device Telemetry
       * Enable Service Routes for Telemetry
       * Manage the Data the Device Telemetry Collects
       * Manage Historical Device Telemetry
     * Monitor Device Telemetry
     * Sample the Data that Device Telemetry Collects
   * Authentication
     * Authentication Types
       * External Authentication Services
       * Multi-Factor Authentication
       * SAML
       * Kerberos
       * TACACS+
       * RADIUS
       * LDAP
       * Local Authentication
     * Plan Your Authentication Deployment
     * Configure Multi-Factor Authentication
       * Configure MFA Between RSA SecurID and the Firewall
       * Configure MFA Between Okta and the Firewall
       * Configure MFA Between Duo and the Firewall
     * Configure SAML Authentication
     * Configure Kerberos Single Sign-On
     * Configure Kerberos Server Authentication
     * Configure TACACS+ Authentication
     * Configure RADIUS Authentication
     * Configure LDAP Authentication
     * Connection Timeouts for Authentication Servers
       * Guidelines for Setting Authentication Server Timeouts
       * Modify the PAN-OS Web Server Timeout
       * Modify the Authentication Portal Session Timeout
     * Configure Local Database Authentication
     * Configure an Authentication Profile and Sequence
     * Test Authentication Server Connectivity
     * Authentication Policy
       * Authentication Timestamps
       * Configure Authentication Policy
     * Troubleshoot Authentication Issues
   * Certificate Management
     * Keys and Certificates
     * Default Trusted Certificate Authorities (CAs)
     * Certificate Revocation
       * Certificate Revocation List (CRL)
       * Online Certificate Status Protocol (OCSP)
     * Certificate Deployment
     * Set Up Verification for Certificate Revocation Status
       * Configure an OCSP Responder
       * Configure Revocation Status Verification of Certificates
       * Configure Revocation Status Verification of Certificates Used for
         SSL/TLS Decryption
     * Configure the Master Key
     * Master Key Encryption
       * Configure Master Key Encryption Level
       * Master Key Encryption on a Firewall HA Pair
       * Master Key Encryption Logs
       * Unique Master Key Encryptions for AES-256-GCM
     * Obtain Certificates
       * Create a Self-Signed Root CA Certificate
       * Generate a Certificate
       * Import a Certificate and Private Key
       * Obtain a Certificate from an External CA
       * Install a Device Certificate
       * Restore an Expired Device Certificate
       * Deploy Certificates Using SCEP
     * Export a Certificate and Private Key
     * Configure a Certificate Profile
     * Configure an SSL/TLS Service Profile
     * Configure an SSH Service Profile
     * Replace the Certificate for Inbound Management Traffic
     * Configure the Key Size for SSL Forward Proxy Server Certificates
     * Revoke and Renew Certificates
       * Revoke a Certificate
       * Renew a Certificate
     * Secure Keys with a Hardware Security Module
       * Set Up Connectivity with an HSM
         * Set Up Connectivity with a SafeNet Network HSM
         * Set Up Connectivity with an nCipher nShield Connect HSM
       * Encrypt a Master Key Using an HSM
         * Encrypt the Master Key
         * Refresh the Master Key Encryption
       * Store Private Keys on an HSM
       * Manage the HSM Deployment
   * High Availability
     * HA Overview
     * HA Concepts
       * HA Modes
       * HA Links and Backup Links
         * HA Ports on Palo Alto Networks Firewalls
       * Device Priority and Preemption
       * Failover
       * LACP and LLDP Pre-Negotiation for Active/Passive HA
       * Floating IP Address and Virtual MAC Address
       * ARP Load-Sharing
       * Route-Based Redundancy
       * HA Timers
       * Session Owner
       * Session Setup
       * NAT in Active/Active HA Mode
       * ECMP in Active/Active HA Mode
     * Set Up Active/Passive HA
       * Prerequisites for Active/Passive HA
       * Configuration Guidelines for Active/Passive HA
       * Configure Active/Passive HA
       * Define HA Failover Conditions
       * Verify Failover
     * Set Up Active/Active HA
       * Prerequisites for Active/Active HA
       * Configure Active/Active HA
       * Determine Your Active/Active Use Case
         * Use Case: Configure Active/Active HA with Route-Based Redundancy
         * Use Case: Configure Active/Active HA with Floating IP Addresses
         * Use Case: Configure Active/Active HA with ARP Load-Sharing
         * Use Case: Configure Active/Active HA with Floating IP Address Bound
           to Active-Primary Firewall
         * Use Case: Configure Active/Active HA with Source DIPP NAT Using
           Floating IP Addresses
         * Use Case: Configure Separate Source NAT IP Address Pools for
           Active/Active HA Firewalls
         * Use Case: Configure Active/Active HA for ARP Load-Sharing with
           Destination NAT
         * Use Case: Configure Active/Active HA for ARP Load-Sharing with
           Destination NAT in Layer 3
     * HA Clustering Overview
     * HA Clustering Best Practices and Provisioning
     * Configure HA Clustering
     * Refresh HA1 SSH Keys and Configure Key Options
     * HA Firewall States
     * Reference: HA Synchronization
   * Monitoring
     * Use the Dashboard
     * Use the Application Command Center
       * ACC—First Look
       * ACC Tabs
       * ACC Widgets
       * Widget Descriptions
       * ACC Filters
       * Interact with the ACC
       * Use Case: ACC—Path of Information Discovery
     * Use the App Scope Reports
       * Summary Report
       * Change Monitor Report
       * Threat Monitor Report
       * Threat Map Report
       * Network Monitor Report
       * Traffic Map Report
     * Use the Automated Correlation Engine
       * Automated Correlation Engine Concepts
         * Correlation Object
         * Correlated Events
       * View the Correlated Objects
       * Interpret Correlated Events
       * Use the Compromised Hosts Widget in the ACC
     * Take Packet Captures
       * Types of Packet Captures
       * Disable Hardware Offload
       * Take a Custom Packet Capture
       * Take a Threat Packet Capture
       * Take an Application Packet Capture
         * Take a Packet Capture for Unknown Applications
         * Take a Custom Application Packet Capture
       * Take a Packet Capture on the Management Interface
     * Monitor Applications and Threats
     * View and Manage Logs
       * Log Types and Severity Levels
         * Traffic Logs
         * Threat Logs
         * URL Filtering Logs
         * WildFire Submissions Logs
         * Data Filtering Logs
         * Correlation Logs
         * Tunnel Inspection Logs
         * Config Logs
         * System Logs
         * HIP Match Logs
         * GlobalProtect Logs
         * IP-Tag Logs
         * User-ID Logs
         * Decryption Logs
         * Alarms Logs
         * Authentication Logs
         * Unified Logs
       * View Logs
       * Filter Logs
       * Export Logs
       * Use Case: Export Traffic Logs for a Date Range
       * Configure Log Storage Quotas and Expiration Periods
       * Schedule Log Exports to an SCP or FTP Server
     * Monitor Block List
     * View and Manage Reports
       * Report Types
       * View Reports
       * Configure the Expiration Period and Run Time for Reports
       * Disable Predefined Reports
       * Custom Reports
       * Generate Custom Reports
       * Generate Botnet Reports
         * Configure a Botnet Report
         * Interpret Botnet Report Output
       * Generate the SaaS Application Usage Report
       * Manage PDF Summary Reports
       * Generate User/Group Activity Reports
       * Manage Report Groups
       * Schedule Reports for Email Delivery
       * Manage Report Storage Capacity
     * View Policy Rule Usage
     * Use External Services for Monitoring
     * Configure Log Forwarding
     * Configure Email Alerts
     * Use Syslog for Monitoring
       * Configure Syslog Monitoring
       * Syslog Field Descriptions
         * Traffic Log Fields
         * Threat Log Fields
         * URL Filtering Log Fields
         * Data Filtering Log Fields
         * HIP Match Log Fields
         * GlobalProtect Log Fields
         * IP-Tag Log Fields
         * User-ID Log Fields
         * Decryption Log Fields
         * Tunnel Inspection Log Fields
         * SCTP Log Fields
         * Authentication Log Fields
         * Config Log Fields
         * System Log Fields
         * Correlated Events Log Fields
         * GTP Log Fields
         * Audit Log Fields
         * Syslog Severity
         * Custom Log/Event Format
         * Escape Sequences
     * SNMP Monitoring and Traps
       * SNMP Support
       * Use an SNMP Manager to Explore MIBs and Objects
         * Identify a MIB Containing a Known OID
         * Walk a MIB
         * Identify the OID for a System Statistic or Trap
       * Enable SNMP Services for Firewall-Secured Network Elements
       * Monitor Statistics Using SNMP
       * Forward Traps to an SNMP Manager
       * Supported MIBs
         * MIB-II
         * IF-MIB
         * HOST-RESOURCES-MIB
         * ENTITY-MIB
         * ENTITY-SENSOR-MIB
         * ENTITY-STATE-MIB
         * IEEE 802.3 LAG MIB
         * LLDP-V2-MIB.my
         * BFD-STD-MIB
         * PAN-COMMON-MIB.my
         * PAN-GLOBAL-REG-MIB.my
         * PAN-GLOBAL-TC-MIB.my
         * PAN-LC-MIB.my
         * PAN-PRODUCT-MIB.my
         * PAN-ENTITY-EXT-MIB.my
         * PAN-TRAPS.my
     * Forward Logs to an HTTP/S Destination
     * NetFlow Monitoring
       * Configure NetFlow Exports
       * NetFlow Templates
     * Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
     * Monitor Transceivers
   * User-ID
     * User-ID Overview
     * User-ID Concepts
       * Group Mapping
       * User Mapping
         * Server Monitoring
         * Port Mapping
         * XFF Headers
         * Username Header Insertion
         * Authentication Policy and Authentication Portal
         * Syslog
         * GlobalProtect
         * XML API
         * Client Probing
     * Enable User-ID
     * Map Users to Groups
     * Map IP Addresses to Users
       * Create a Dedicated Service Account for the User-ID Agent
       * Configure User Mapping Using the Windows User-ID Agent
         * Install the Windows-Based User-ID Agent
         * Configure the Windows User-ID Agent for User Mapping
       * Configure User Mapping Using the PAN-OS Integrated User-ID Agent
       * Configure Server Monitoring Using WinRM
       * Configure User-ID to Monitor Syslog Senders for User Mapping
         * Configure the PAN-OS Integrated User-ID Agent as a Syslog Listener
         * Configure the Windows User-ID Agent as a Syslog Listener
       * Map IP Addresses to Usernames Using Authentication Portal
         * Authentication Portal Authentication Methods
         * Authentication Portal Modes
         * Configure Authentication Portal
       * Configure User Mapping for Terminal Server Users
         * Configure the Palo Alto Networks Terminal Server (TS) Agent for User
           Mapping
         * Retrieve User Mappings from a Terminal Server Using the PAN-OS XML
           API
       * Send User Mappings to User-ID Using the XML API
     * Enable User- and Group-Based Policy
     * Enable Policy for Users with Multiple Accounts
     * Verify the User-ID Configuration
     * Deploy User-ID in a Large-Scale Network
       * Deploy User-ID for Numerous Mapping Information Sources
         * Windows Log Forwarding and Global Catalog Servers
         * Plan a Large-Scale User-ID Deployment
         * Configure Windows Log Forwarding
         * Configure User-ID for Numerous Mapping Information Sources
       * Insert Username in HTTP Headers
       * Redistribute Data and Authentication Timestamps
         * Firewall Deployment for Data Redistribution
         * Configure Data Redistribution
       * Share User-ID Mappings Across Virtual Systems
   * App-ID
     * App-ID Overview
     * Streamlined App-ID Policy Rules
       * Create an Application Filter Using Tags
       * Create an Application Filter Based on Custom Tags
     * App-ID and HTTP/2 Inspection
     * Manage Custom or Unknown Applications
     * Manage New and Modified App-IDs
       * Workflow to Best Incorporate New and Modified App-IDs
       * See the New and Modified App-IDs in a Content Release
       * See How New and Modified App-IDs Impact Your Security Policy
       * Ensure Critical New App-IDs are Allowed
       * Monitor New App-IDs
       * Disable and Enable App-IDs
     * Use Application Objects in Policy
       * Create an Application Group
       * Create an Application Filter
       * Create a Custom Application
       * Resolve Application Dependencies
     * Safely Enable Applications on Default Ports
     * Applications with Implicit Support
     * Security Policy Rule Optimization
       * Policy Optimizer Concepts
         * Sorting and Filtering Security Policy Rules
         * Clear Application Usage Data
       * Migrate Port-Based to App-ID Based Security Policy Rules
       * Rule Cloning Migration Use Case: Web Browsing and SSL Traffic
       * Add Applications to an Existing Rule
       * Identify Security Policy Rules with Unused Applications
       * High Availability for Application Usage Statistics
       * How to Disable Policy Optimizer
     * App-ID Cloud Engine
       * Prepare to Deploy App-ID Cloud Engine
       * Enable or Disable the App-ID Cloud Engine
       * App-ID Cloud Engine Processing and Policy Usage
       * New App Viewer (Policy Optimizer)
       * Add Apps to an Application Filter with Policy Optimizer
       * Add Apps to an Application Group with Policy Optimizer
       * Add Apps Directly to a Rule with Policy Optimizer
       * Replace an RMA Firewall (ACE)
       * Impact of License Expiration or Disabling ACE
       * Commit Failure Due to Cloud Content Rollback
       * Troubleshoot App-ID Cloud Engine
     * SaaS App-ID Policy Recommendation
       * Import SaaS Policy Recommendation
       * Import Updated SaaS Policy Recommendation
       * Remove Deleted SaaS Policy Recommendation
     * Application Level Gateways
     * Disable the SIP Application-level Gateway (ALG)
     * Use HTTP Headers to Manage SaaS Application Access
       * Understand SaaS Custom Headers
       * Domains used by the Predefined SaaS Application Types
       * Create HTTP Header Insertion Entries using Predefined Types
       * Create Custom HTTP Header Insertion Entries
     * Maintain Custom Timeouts for Data Center Applications
   * Device-ID
     * Device-ID Overview
     * Prepare to Deploy Device-ID
     * Configure Device-ID
     * Manage Device-ID
     * CLI Commands for Device-ID
   * Decryption
     * Decryption Overview
     * Decryption Concepts
       * Keys and Certificates for Decryption Policies
       * SSL Forward Proxy
       * SSL Forward Proxy Decryption Profile
       * SSL Inbound Inspection
       * SSL Inbound Inspection Decryption Profile
       * SSL Protocol Settings Decryption Profile
       * SSH Proxy
       * SSH Proxy Decryption Profile
       * Profile for No Decryption
       * SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
       * Perfect Forward Secrecy (PFS) Support for SSL Decryption
       * SSL Decryption and Subject Alternative Names (SANs)
       * TLSv1.3 Decryption
       * High Availability Not Supported for Decrypted Sessions
       * Decryption Mirroring
     * Prepare to Deploy Decryption
       * Work with Stakeholders to Develop a Decryption Deployment Strategy
       * Develop a PKI Rollout Plan
       * Size the Decryption Firewall Deployment
       * Plan a Staged, Prioritized Deployment
     * Define Traffic to Decrypt
       * Create a Decryption Profile
       * Create a Decryption Policy Rule
     * Configure SSL Forward Proxy
     * Configure SSL Inbound Inspection
     * Configure SSH Proxy
     * Configure Server Certificate Verification for Undecrypted Traffic
     * Decryption Exclusions
       * Palo Alto Networks Predefined Decryption Exclusions
       * Exclude a Server from Decryption for Technical Reasons
       * Local Decryption Exclusion Cache
       * Create a Policy-Based Decryption Exclusion
     * Block Private Key Export
       * Generate a Private Key and Block It
       * Import a Private Key and Block It
       * Import a Private Key for IKE Gateway and Block It
       * Verify Private Key Blocking
     * Enable Users to Opt Out of SSL Decryption
     * Temporarily Disable SSL Decryption
     * Configure Decryption Port Mirroring
     * Verify Decryption
     * Troubleshoot and Monitor Decryption
       * Decryption Application Command Center Widgets
       * Decryption Log
         * Configure Decryption Logging
         * Decryption Log Errors, Error Indexes, and Bitmasks
         * Repair Incomplete Certificate Chains
       * Custom Report Templates for Decryption
       * Unsupported Parameters by Proxy Type and TLS Version
       * Decryption Troubleshooting Workflow Examples
         * Investigate Decryption Failure Reasons
         * Troubleshoot Unsupported Cipher Suites
         * Identify Weak Protocols and Cipher Suites
         * Identify Untrusted CA Certificates
         * Troubleshoot Expired Certificates
         * Troubleshoot Revoked Certificates
         * Troubleshoot Pinned Certificates
     * Activate Free Licenses for Decryption Features
   * Quality of Service
     * QoS Overview
     * QoS Concepts
       * QoS for Applications and Users
       * QoS Policy
       * QoS Profile
       * QoS Classes
       * QoS Priority Queuing
       * QoS Bandwidth Management
       * QoS Egress Interface
       * QoS for Clear Text and Tunneled Traffic
     * Configure QoS
     * Configure Lockless QoS
     * Configure QoS for a Virtual System
     * Enforce QoS Based on DSCP Classification
     * QoS Use Cases
       * Use Case: QoS for a Single User
       * Use Case: QoS for Voice and Video Applications
   * VPNs
     * VPN Deployments
     * Site-to-Site VPN Overview
     * Site-to-Site VPN Concepts
       * IKE Gateway
       * Tunnel Interface
       * Tunnel Monitoring
       * Internet Key Exchange (IKE) for VPN
         * IKE Phase 1
         * IKE Phase 2
         * Methods of Securing IPSec VPN Tunnels (IKE Phase 2)
       * IKEv2
         * Liveness Check
         * Cookie Activation Threshold and Strict Cookie Validation
         * Traffic Selectors
         * Hash and URL Certificate Exchange
         * SA Key Lifetime and Re-Authentication Interval
     * Set Up Site-to-Site VPN
       * Set Up an IKE Gateway
         * Export a Certificate for a Peer to Access Using Hash and URL
         * Import a Certificate for IKEv2 Gateway Authentication
         * Change the Key Lifetime or Authentication Interval for IKEv2
         * Change the Cookie Activation Threshold for IKEv2
         * Configure IKEv2 Traffic Selectors
       * Define Cryptographic Profiles
         * Define IKE Crypto Profiles
         * Define IPSec Crypto Profiles
       * Set Up an IPSec Tunnel
       * Set Up Tunnel Monitoring
         * Define a Tunnel Monitoring Profile
         * View the Status of the Tunnels
       * Enable/Disable, Refresh or Restart an IKE Gateway or IPSec Tunnel
         * Enable or Disable an IKE Gateway or IPSec Tunnel
         * Refresh and Restart Behaviors
         * Refresh or Restart an IKE Gateway or IPSec Tunnel
       * Test VPN Connectivity
       * Interpret VPN Error Messages
     * Site-to-Site VPN Quick Configs
       * Site-to-Site VPN with Static Routing
       * Site-to-Site VPN with OSPF
       * Site-to-Site VPN with Static and Dynamic Routing
   * Large Scale VPN (LSVPN)
     * LSVPN Overview
     * Create Interfaces and Zones for the LSVPN
     * Enable SSL Between GlobalProtect LSVPN Components
       * About Certificate Deployment
       * Deploy Server Certificates to the GlobalProtect LSVPN Components
       * Deploy Client Certificates to the GlobalProtect Satellites Using SCEP
     * Configure the Portal to Authenticate Satellites
     * Configure GlobalProtect Gateways for LSVPN
     * Configure the GlobalProtect Portal for LSVPN
       * GlobalProtect Portal for LSVPN Prerequisite Tasks
       * Configure the Portal
       * Define the Satellite Configurations
     * Prepare the Satellite to Join the LSVPN
     * Verify the LSVPN Configuration
     * LSVPN Quick Configs
       * Basic LSVPN Configuration with Static Routing
       * Advanced LSVPN Configuration with Dynamic Routing
       * Advanced LSVPN Configuration with iBGP
   * Policy
     * Policy Types
     * Security Policy
       * Components of a Security Policy Rule
       * Security Policy Actions
       * Create a Security Policy Rule
     * Policy Objects
     * Security Profiles
       * Create a Security Profile Group
       * Set Up or Override a Default Security Profile Group
       * Data Filtering
         * Create a Data Filtering Profile
         * Predefined Data Filtering Patterns
       * Set Up File Blocking
     * Track Rules Within a Rulebase
     * Enforce Policy Rule Description, Tag, and Audit Comment
     * Move or Clone a Policy Rule or Object to a Different Virtual System
     * Use an Address Object to Represent IP Addresses
       * Address Objects
       * Create an Address Object
     * Use Tags to Group and Visually Distinguish Objects
       * Create and Apply Tags
       * Modify Tags
       * View Rules by Tag Group
       * Tag Browser
     * Use an External Dynamic List in Policy
       * External Dynamic List
       * Formatting Guidelines for an External Dynamic List
         * IP Address List
         * Domain List
         * URL List
       * Built-in External Dynamic Lists
       * Configure the Firewall to Access an External Dynamic List
       * Configure the Firewall to Access an External Dynamic List from the EDL
         Hosting Service
         * Create an External Dynamic List Using the EDL Hosting Service
         * Convert the GlobalSign Root R1 Certificate to PEM Format
       * Retrieve an External Dynamic List from the Web Server
       * View External Dynamic List Entries
       * Exclude Entries from an External Dynamic List
       * Enforce Policy on an External Dynamic List
       * Find External Dynamic Lists That Failed Authentication
       * Disable Authentication for an External Dynamic List
     * Register IP Addresses and Tags Dynamically
     * Use Dynamic User Groups in Policy
     * Use Auto-Tagging to Automate Security Actions
     * Monitor Changes in the Virtual Environment
       * Enable VM Monitoring to Track Changes on the Virtual Network
       * Attributes Monitored on Virtual Machines in Cloud Platforms
       * Use Dynamic Address Groups in Policy
     * CLI Commands for Dynamic IP Addresses and Tags
     * Enforce Policy on Endpoints and Users Behind an Upstream Device
       * Use XFF Values for Policy Based on Source Users
       * Use XFF IP Address Values in Security Policy and Logging
       * Use the IP Address in the XFF Header to Troubleshoot Events
     * Policy-Based Forwarding
       * PBF
         * Egress Path and Symmetric Return
         * Path Monitoring for PBF
         * Service Versus Applications in PBF
       * Create a Policy-Based Forwarding Rule
       * Use Case: PBF for Outbound Access with Dual ISPs
     * Application Override Policy
     * Test Policy Rules
   * Virtual Systems
     * Virtual Systems Overview
       * Virtual System Components and Segmentation
       * Benefits of Virtual Systems
       * Use Cases for Virtual Systems
       * Platform Support and Licensing for Virtual Systems
       * Administrative Roles for Virtual Systems
       * Shared Objects for Virtual Systems
     * Communication Between Virtual Systems
       * Inter-VSYS Traffic That Must Leave the Firewall
       * Inter-VSYS Traffic That Remains Within the Firewall
         * External Zone
         * External Zones and Security Policies For Traffic Within a Firewall
       * Inter-VSYS Communication Uses Two Sessions
     * Shared Gateway
       * External Zones and Shared Gateway
       * Networking Considerations for a Shared Gateway
     * Configure Virtual Systems
     * Configure Inter-Virtual System Communication within the Firewall
     * Configure a Shared Gateway
     * Customize Service Routes for a Virtual System
       * Customize Service Routes to Services for Virtual Systems
       * Configure a PA-7000 Series Firewall for Logging Per Virtual System
         * Configure a PA-7000 Series LPC for Logging per Virtual System
         * Configure a PA-7000 Series LFC for Logging per Virtual System
       * Configure Administrative Access Per Virtual System or Firewall
     * Virtual System Functionality with Other Features
   * Zone Protection and DoS Protection
     * Network Segmentation Using Zones
     * How Do Zones Protect the Network?
     * Zone Defense
       * Zone Defense Tools
       * How Do the Zone Defense Tools Work?
       * Firewall Placement for DoS Protection
       * Baseline CPS Measurements for Setting Flood Thresholds
         * CPS Measurements to Take
         * How to Measure CPS
       * Zone Protection Profiles
         * Flood Protection
         * Reconnaissance Protection
         * Packet-Based Attack Protection
         * Protocol Protection
         * Ethernet SGT Protection
       * Packet Buffer Protection
       * DoS Protection Profiles and Policy Rules
         * Classified Versus Aggregate DoS Protection
         * DoS Protection Profiles
         * DoS Protection Policy Rules
     * Configure Zone Protection to Increase Network Security
       * Configure Reconnaissance Protection
       * Configure Packet Based Attack Protection
       * Configure Protocol Protection
         * Use Case: Non-IP Protocol Protection Between Security Zones on Layer
           2 Interfaces
         * Use Case: Non-IP Protocol Protection Within a Security Zone on Layer
           2 Interfaces
       * Configure Packet Buffer Protection
       * Configure Packet Buffer Protection Based on Latency
       * Configure Ethernet SGT Protection
     * DoS Protection Against Flooding of New Sessions
       * Multiple-Session DoS Attack
       * Single-Session DoS Attack
       * Configure DoS Protection Against Flooding of New Sessions
       * End a Single Session DoS Attack
       * Identify Sessions That Use Too Much of the On-Chip Packet Descriptor
       * Discard a Session Without a Commit
   * Certifications
     * Enable FIPS and Common Criteria Support
       * Access the Maintenance Recovery Tool (MRT)
       * Change the Operational Mode to FIPS-CC Mode
     * FIPS-CC Security Functions
     * Scrub the Swap Memory on Firewalls or Appliances Running in FIPS-CC Mode
 * 
   Networking
   Version
   PAN-OS 10.1
    * PAN-OS 10.1
    * PAN-OS 10.2
    * PAN-OS 11.0
    * PAN-OS 11.1
   
   * Networking
     * Networking Introduction
   * Configure Interfaces
     * Tap Interfaces
     * Virtual Wire Interfaces
       * Layer 2 and Layer 3 Packets over a Virtual Wire
       * Port Speeds of Virtual Wire Interfaces
       * LLDP over a Virtual Wire
       * Aggregated Interfaces for a Virtual Wire
       * Virtual Wire Support of High Availability
       * Zone Protection for a Virtual Wire Interface
       * VLAN-Tagged Traffic
       * Virtual Wire Subinterfaces
       * Configure Virtual Wires
     * Layer 2 Interfaces
       * Layer 2 Interfaces with No VLANs
       * Layer 2 Interfaces with VLANs
       * Configure a Layer 2 Interface
       * Configure a Layer 2 Interface, Subinterface, and VLAN
       * Manage Per-VLAN Spanning Tree (PVST+) BPDU Rewrite
     * Layer 3 Interfaces
       * Configure Layer 3 Interfaces
       * Manage IPv6 Hosts Using NDP
         * IPv6 Router Advertisements for DNS Configuration
         * Configure RDNS Servers and DNS Search List for IPv6 Router
           Advertisements
         * NDP Monitoring
         * Enable NDP Monitoring
     * Configure an Aggregate Interface Group
     * Configure Bonjour Reflector for Network Segmentation
     * Use Interface Management Profiles to Restrict Access
   * Virtual Routers
     * Virtual Router Overview
     * Configure Virtual Routers
   * Service Routes
     * Service Routes Overview
     * Configure Service Routes
   * Static Routes
     * Static Route Overview
     * Static Route Removal Based on Path Monitoring
     * Configure a Static Route
     * Configure Path Monitoring for a Static Route
   * RIP
     * RIP Overview
     * Configure RIP
   * OSPF
     * OSPF Concepts
       * OSPFv3
       * OSPF Neighbors
       * OSPF Areas
       * OSPF Router Types
     * Configure OSPF
     * Configure OSPFv3
     * Configure OSPF Graceful Restart
     * Confirm OSPF Operation
       * View the Routing Table
       * Confirm OSPF Adjacencies
       * Confirm that OSPF Connections are Established
   * BGP
     * BGP Overview
     * MP-BGP
     * Configure BGP
     * Configure a BGP Peer with MP-BGP for IPv4 or IPv6 Unicast
     * Configure a BGP Peer with MP-BGP for IPv4 Multicast
     * BGP Confederations
   * IP Multicast
     * IGMP
     * PIM
       * Shortest-Path Tree (SPT) and Shared Tree
       * PIM Assert Mechanism
       * Reverse-Path Forwarding
     * Configure IP Multicast
     * View IP Multicast Information
   * Route Redistribution
     * Route Redistribution Overview
     * Configure Route Redistribution
   * GRE Tunnels
     * GRE Tunnel Overview
     * Create a GRE Tunnel
   * DHCP
     * DHCP Overview
     * Firewall as a DHCP Server and Client
     * DHCP Messages
     * DHCP Addressing
       * DHCP Address Allocation Methods
       * DHCP Leases
     * DHCP Options
       * Predefined DHCP Options
       * Multiple Values for a DHCP Option
       * DHCP Options 43, 55, and 60 and Other Customized Options
     * Configure an Interface as a DHCP Server
     * Configure an Interface as a DHCP Client
     * Configure the Management Interface as a DHCP Client
     * Configure an Interface as a DHCP Relay Agent
     * Monitor and Troubleshoot DHCP
       * View DHCP Server Information
       * Clear DHCP Leases
       * View DHCP Client Information
       * Gather Debug Output about DHCP
   * DNS
     * DNS Overview
     * DNS Proxy Object
     * DNS Server Profile
     * Multi-Tenant DNS Deployments
     * Configure a DNS Proxy Object
     * Configure a DNS Server Profile
     * Use Case 1: Firewall Requires DNS Resolution
     * Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for
       Security Policies, Reporting, and Services within its Virtual System
     * Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
     * DNS Proxy Rule and FQDN Matching
   * DDNS
     * Dynamic DNS Overview
     * Configure Dynamic DNS for Firewall Interfaces
   * NAT
     * NAT Policy Rules
       * NAT Policy Overview
       * NAT Address Pools Identified as Address Objects
       * Proxy ARP for NAT Address Pools
     * Source NAT and Destination NAT
       * Source NAT
       * Destination NAT
       * Destination NAT with DNS Rewrite Use Cases
         * Destination NAT with DNS Rewrite Reverse Use Cases
         * Destination NAT with DNS Rewrite Forward Use Cases
     * NAT Rule Capacities
     * Dynamic IP and Port NAT Oversubscription
     * Dataplane NAT Memory Statistics
     * Configure NAT
       * Translate Internal Client IP Addresses to Your Public IP Address
         (Source DIPP NAT)
       * Enable Clients on the Internal Network to Access your Public Servers
         (Destination U-Turn NAT)
       * Enable Bi-Directional Address Translation for Your Public-Facing
         Servers (Static Source NAT)
       * Configure Destination NAT with DNS Rewrite
       * Configure Destination NAT Using Dynamic IP Addresses
       * Modify the Oversubscription Rate for DIPP NAT
       * Reserve Dynamic IP NAT Addresses
       * Disable NAT for a Specific Host or Interface
     * NAT Configuration Examples
       * Destination NAT Example—One-to-One Mapping
       * Destination NAT with Port Translation Example
       * Destination NAT Example—One-to-Many Mapping
       * Source and Destination NAT Example
       * Virtual Wire Source NAT Example
       * Virtual Wire Static NAT Example
       * Virtual Wire Destination NAT Example
   * NPTv6
     * NPTv6 Overview
       * Unique Local Addresses
       * Reasons to Use NPTv6
     * How NPTv6 Works
       * Checksum-Neutral Mapping
       * Bi-Directional Translation
       * NPTv6 Applied to a Specific Service
     * NDP Proxy
     * NPTv6 and NDP Proxy Example
       * The ND Cache in NPTv6 Example
       * The NDP Proxy in NPTv6 Example
       * The NPTv6 Translation in NPTv6 Example
       * Neighbors in the ND Cache are Not Translated
     * Create an NPTv6 Policy
   * NAT64
     * NAT64 Overview
     * IPv4-Embedded IPv6 Address
     * DNS64 Server
     * Path MTU Discovery
     * IPv6-Initiated Communication
     * Configure NAT64 for IPv6-Initiated Communication
     * Configure NAT64 for IPv4-Initiated Communication
     * Configure NAT64 for IPv4-Initiated Communication with Port Translation
   * ECMP
     * ECMP Load-Balancing Algorithms
     * Configure ECMP on a Virtual Router
     * Enable ECMP for Multiple BGP Autonomous Systems
     * Verify ECMP
   * LLDP
     * LLDP Overview
     * Supported TLVs in LLDP
     * LLDP Syslog Messages and SNMP Traps
     * Configure LLDP
     * View LLDP Settings and Status
     * Clear LLDP Statistics
   * BFD
     * BFD Overview
       * BFD Model, Interface, and Client Support
       * Non-Supported RFC Components of BFD
       * BFD for Static Routes
       * BFD for Dynamic Routing Protocols
     * Configure BFD
     * Reference: BFD Details
   * Session Settings and Timeouts
     * Transport Layer Sessions
     * TCP
       * TCP Half Closed and TCP Time Wait Timers
       * Unverified RST Timer
       * TCP Split Handshake Drop
       * Maximum Segment Size (MSS)
     * UDP
     * ICMP
       * Security Policy Rules Based on ICMP and ICMPv6 Packets
       * ICMPv6 Rate Limiting
     * Control Specific ICMP or ICMPv6 Types and Codes
     * Configure Session Timeouts
     * Configure Session Settings
     * Session Distribution Policies
       * Session Distribution Policy Descriptions
       * Change the Session Distribution Policy and View Statistics
     * Prevent TCP Split Handshake Session Establishment
   * Tunnel Content Inspection
     * Tunnel Content Inspection Overview
     * Configure Tunnel Content Inspection
     * View Inspected Tunnel Activity
     * View Tunnel Information in Logs
     * Create a Custom Report Based on Tagged Tunnel Traffic
     * Tunnel Acceleration Behavior
     * Disable Tunnel Acceleration
   * Network Packet Broker
     * Network Packet Broker Overview
     * How Network Packet Broker Works
     * Prepare to Deploy Network Packet Broker
     * Configure Transparent Bridge Security Chains
     * Configure Routed Layer 3 Security Chains
     * Network Packet Broker HA Support
     * User Interface Changes for Network Packet Broker
     * Limitations of Network Packet Broker
     * Troubleshoot Network Packet Broker
 * 
   AIOps
   * AIOps for NGFW
     * Regions for AIOps for NGFW
     * Free and Premium Features
     * How to Activate AIOps for NGFW
     * Where Are My AIOps for NGFW Features?
     * Panorama CloudConnector Plugin
     * Get Alert Notifications
     * Export Metadata for Troubleshooting
     * Troubleshoot NGFW Connectivity and Policy Enforcement Anomalies
   * Device Telemetry for AIOps for NGFW
     * Enable Telemetry on Devices
     * Domains Required for AIOps for NGFW
   * Utilize Activity Dashboards
     * Monitor Threats
     * View Executive Summary
     * Monitor Application Usage
     * Monitor User Activity
     * Monitor WildFire
     * Monitor DNS Security
     * Monitor Advanced Threat Prevention
     * Monitor Data Loss Prevention
   * Optimize Security Posture
     * Monitor Security Posture Insights
     * Monitor Feature Adoption
     * Monitor Feature Configuration
     * Monitor Security Advisories
     * Monitor Security Subscriptions
     * Assess Vulnerabilities
     * Build a Custom Dashboard
     * Monitor Compliance Summary
     * Configure Security Checks And Other Posture Settings
     * Proactively Enforce Security Checks
     * Policy Analyzer
       * Pre-Change Policy Analysis
       * Pre-Change Policy Analysis Reports
       * Post-Change Policy Analysis
   * NGFW Health and Software Management
     * View Network Usage
     * View Device Health
     * Get Upgrade Recommendations
     * Analyze Metric Capacity
   * Best Practices in NGFWs
     * On-Demand BPA Report
       * Generate Your BPA & Adoption Summary Report, On Demand
     * Best Practices
 * 
   Incidents & Alerts
   * Alerts
     * Manage Alerts
     * View Alert Details
     * View Probable Causes
     * Forecasting and Anomaly Detection
     * Manage Capacity Analyzer Alerts
     * CPU Usage Metrics in AIOps for NGFW
     * Create a Notification Rule
       * Integrating with ServiceNow
   * AIOps for NGFW Alerts Reference
     * Premium Health Alerts
     * Free Health Alerts
     * Security Posture Alerts
     * Service Alerts
     * Alerts Raised by Leveraging Machine Learning
   * Incidents
     * Manage Incidents
     * View Incident Details
 * 
   Release Notes
   Version
   Cloud Management and AIOps for NGFW
    * Cloud Management and AIOps for NGFW
    * PAN-OS 10.0 (EoL)
    * PAN-OS 10.1
    * PAN-OS 10.2
    * PAN-OS 11.0
    * PAN-OS 11.1
    * PAN-OS 8.1 (EoL)
    * PAN-OS 9.0 (EoL)
    * PAN-OS 9.1
   
   * New Features for AIOps for NGFW
     * New Features in February 2024
     * New Features in December 2023
     * New Features in November 2023
     * New Features in September 2023
     * New Features Through August 2023
   * Known and Addressed Issues
   * Feature History for AIOps for NGFW




--------------------------------------------------------------------------------

Previous
Workflow to Best Incorporate New and Modified App-IDs
Next
See How New and Modified App-IDs Impact Your Security Policy

--------------------------------------------------------------------------------

SEE THE NEW AND MODIFIED APP-IDS IN A CONTENT RELEASE


For both downloaded and installed content updates, you can see a list of the new
and modified App-IDs the update includes. Full application details are provided,
and importantly, updates to applications with network-wide impact (for example,
LDAP or IKE) are prominently flagged as a recommended for policy review. For
modified App-IDs, application details also describe how coverage is either now
expanded or more precise.
Select
Device
Dynamic Updates
and select
Check Now
to refresh the list of available content updates.


For either a downloaded or currently installed content release, click
Review Apps
link in the
Actions
column to view details on newly-identified and modified applications in that
release:



Review the App-IDs this content release introduces or modifies since the last
content version.
New and modified App-IDs are listed separately. Full application details are
provided for each, and App-IDs that Palo Alto Networks foresees as having
network-wide impact are flagged as recommended for policy review.

New App-ID details that you can use to assess possible impact to policy
enforcement include:
Depends on
—Lists the application signatures that this App-ID relies on to uniquely
identify the application. If one of the application signatures listed in the
Depends On
field is disabled, the dependent App-ID is also disabled.
Previously Identified As
—Lists the App-IDs that matched to the application before the new App-ID was
installed to uniquely identify the application.
App-ID Enabled
—All App-IDs display as enabled when a content release is downloaded, unless you
choose to manually disable the App-ID signature before installing the content
update.

For modified App-IDs, details include information on:
Expanded Coverage
,
Remove False Positive
, and application metadata changes. The Expanded Coverage and Remove False
Positive fields both indicate how the application’s coverage has changed (it’s
either more comprehensive or has been narrowed) and a clock icon indicates a
metadata change, where certain application details are updated.


Based on your findings, click
Review Policies
to see how the new and modified App-IDs impact security policy enforcement: See
How New and Modified App-IDs Impact Your Security Policy.






--------------------------------------------------------------------------------

Previous
Workflow to Best Incorporate New and Modified App-IDs
Next
See How New and Modified App-IDs Impact Your Security Policy

--------------------------------------------------------------------------------


RECOMMENDED FOR YOU


No results for undefined


ON THIS PAGE




ACTIVATION AND ONBOARDING

--------------------------------------------------------------------------------

Strata Cloud Manager
License Activation & Subscription Management
Cortex Data Lake
Identity and Access Management
Cloud Identity Engine
Device Associations
Tenant Management
Hub


NEXT-GENERATION FIREWALLS

--------------------------------------------------------------------------------

AIOps for NGFW
Cloud Management for NGFWs
Cloud NGFW for AWS
Cloud NGFW for Azure
CN-Series
Firewalls
PAN-OS
PAN-OS SD-WAN
Service Provider
VM-Series


CLOUD-DELIVERED SECURITY SERVICES

--------------------------------------------------------------------------------

Advanced WildFire
Advanced URL Filtering
Advanced Threat Prevention
DNS Security
IoT Security
Enterprise DLP
SaaS Security


NETWORK SECURITY

--------------------------------------------------------------------------------

Security Policy
Decryption
Networking
User-ID
App-ID
Device-ID
IPSec VPN
Shared Policy for NGFWs and Prisma Access


VISIBILITY & MONITORING

--------------------------------------------------------------------------------

Dashboards
Incidents and Alerts
Reports
Autonomous DEM


BEST PRACTICES

--------------------------------------------------------------------------------

Best Practices Library


EXPERTS CORNER

--------------------------------------------------------------------------------

Solutions Docs from Product Experts

PAN-OS Next-Generation Firewall 10.2 Network Security Strata Dynamic Updates
PAN-OS 10.2 Administration Content Release App-ID


TECHNICAL DOCUMENTATION

--------------------------------------------------------------------------------

 * Release Notes
 * Search
 * Blog
 * Compatibility Matrix
 * OSS Listings
 * Sitemap


COMPANY

--------------------------------------------------------------------------------

 * About
 * Careers
 * Customer Support
 * LIVE Community
 * Knowledge Base


LEGAL NOTICES

--------------------------------------------------------------------------------

 * Privacy
 * Trust Center
 * Terms of Use
 * Documents



© 2024 Palo Alto Networks, Inc. All rights reserved.