<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Ensure Business Continuity with the New App-ID Update Safeguard in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/ensure-business-continuity-with-the-new-app-id-update-safeguard/ta-p/1249229</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H1&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ensure screenshot.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70841iADD9C494AB69970B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Ensure screenshot.png" alt="Ensure screenshot.png" /&gt;&lt;/span&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;One of the most common challenges administrators face when utilizing App-ID is the "Monday Morning Surprise": a new content update is installed, a broad application (like ssl) is refined into a more specific one (like acme-app), and suddenly, business-critical traffic is blocked by a default deny rule because the new App-ID hasn't been added to the policy yet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Maintaining a "Security-First" posture shouldn't come at the cost of business continuity, so we are excited to introduce App-ID Update Safeguard, available in PAN-OS 12.1.5 and later. This feature acts as an intelligent catch, ensuring your security policy does not cause an outage when you install a new content version.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Freedom to Update Without the Fear of Outages&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;App-ID Update Safeguard serves as a transitional safety net by capturing your previous policy intent and applying it if new content is not yet explicitly referenced. While reviewing release notes and&lt;/SPAN&gt; &lt;SPAN&gt;leveraging TSID’s&lt;/SPAN&gt; &lt;SPAN&gt;remain a best practice for any administrator, this capability allows your firewall to reference an application’s history during policy enforcement for a time, ensuring that unintended gaps don’t lead to service disruptions or require you to delay critical content updates.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;How it Works&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When enabled, the NGFW utilizes a two-step policy lookup process for new or modified applications:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Primary Lookup&lt;/STRONG&gt;&lt;SPAN&gt;: The firewall checks for the new, specific App-ID in your policy. If it’s explicitly allowed or blocked, that rule is enforced immediately as per usual. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Secondary Safeguard Lookup&lt;/STRONG&gt;&lt;SPAN&gt;: If the new App-ID isn't explicitly in your policy, the firewall will perform a secondary policy lookup, referencing a new attribute called "Previous App-ID." This new data attribute tracks the identity of the traffic held in the previous content version, and the firewall will then take the action of that previous App-ID.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Example Case:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt; Previous State: Traffic identified as ssl and web-browsing (Allowed). &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;New Update: Traffic now identified as acme-app (Not in policy).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt; Without Safeguard: Traffic hits "Default Deny Rule" (Blocked) → Outage. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;With Safeguard:&amp;nbsp;&lt;/SPAN&gt;
&lt;OL class="lia-list-style-type-lower-alpha"&gt;
&lt;LI&gt;&lt;SPAN&gt;Firewall sees that acme-app is new, and not explicitly referenced (Allowed or Blocked)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Checks "Previous App-ID" (ssl, web-browsing)&lt;/LI&gt;
&lt;LI&gt;Sees ssl, web-browsing is allowed&lt;/LI&gt;
&lt;LI&gt;Business continuity is maintained and acme-app is allowed&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It is important to note that this is not a "blanket allow". To ensure your security posture remains intact, the safeguard only permits traffic if &lt;/SPAN&gt;&lt;STRONG&gt;ALL &lt;/STRONG&gt;&lt;SPAN&gt;of an application’s previous identities were&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;already allowed by your policy. If even one associated previous App-ID was explicitly blocked or hit a default deny rule, the traffic remains blocked. This logic allows the firewall to prioritize business continuity while strictly honoring your original security intent.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Visibility and Transition Planning&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The App-ID Update Safeguard isn't meant to be a permanent policy replacement; but rather is a transitional tool designed to protect you at the time of installation while giving you some time to audit your rules. &lt;/SPAN&gt;&lt;STRONG&gt;As a best practice, update your security policies to the new App-IDs &lt;/STRONG&gt;&lt;STRONG&gt;before&lt;/STRONG&gt;&lt;STRONG&gt; the next content release&lt;/STRONG&gt;&lt;SPAN&gt;, as previous attributes do not roll over once a new update is installed. To help you identify which applications are relying on the safeguard, we’ve added visibility tooling and aid across the platform:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Application Command Center Widgets: &lt;/STRONG&gt;&lt;SPAN&gt;Use the "Applications Allowed by Previous App-ID" and "Rules Allowing Apps based on Previous App-ID" widgets to see exactly which rules or applications are running on previous App-ID.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Add Custom Tab.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70884i09B13FC2A3995D70/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Add Custom Tab.png" alt="Add Custom Tab.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Applications Allowed by Previous App-ID&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt; Generates a list of new and modified applications (App-IDs) that are allowed as a result of the Previous App-IDs that are allowed in the current security policy rule.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Applications allowed.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70885iA9C8F15DE7E6C543/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Applications allowed.png" alt="Applications allowed.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Rules Allowing Apps Based on Previous App-ID&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt; Displays security policy rules that allow traffic to pass by referencing the Previous App-ID attribute. This helps you identify the exact rules that are temporarily allowing new or modified applications based on their previous App-ID.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rules allowing apps.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70886iCAF95AB42983AD0D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rules allowing apps.png" alt="Rules allowing apps.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Log Viewer: &lt;/STRONG&gt;&lt;SPAN&gt;Traffic logs now include the "Previous App-ID" attribute, showing you the specific attribute that allowed the traffic to pass.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New App-ID Details: &lt;/STRONG&gt;&lt;SPAN&gt;The detailed app view will now show the “Previous App-ID” attribute in the application overview of a specific app.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Implementation at a Glance&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Enabling the safeguard is a straightforward process within the Panorama Web Interface:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;Ensure you are running PAN-OS 12.1.5 or later.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Go to Device &amp;gt; Setup &amp;gt; Content-ID &amp;gt; Content-ID Settings.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Check the box for "Enable App-ID Update Safeguard”.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt; Create a custom ACC tab with the new Safeguard widgets to track and update your rules before the next content update.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Frequently Asked Questions (FAQ)&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Does the "Previous App-ID" attribute last forever?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;No. The attribute is refreshed with each subsequent content release to make room for the next batch of App-IDs. You can utilize the visibility tools in the ACC and logs to easily find what you need to change, so you can update your policies to include the new App-IDs as the safeguard does not "roll over" indefinitely. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Will this feature create security holes by allowing old applications?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;No. The safeguard logic requires that the previous App-ID was already allowed in your existing policy. If your policy explicitly denies the old App-ID, the new traffic will still be blocked. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: What happens if I already added all of the new App-IDs? Does it still do multiple policy lookups?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;No, the firewall will just take the action of the explicitly mentioned apps. The Safeguard functions as a safety net, so If all apps are already prepared beforehand its logic will not activate. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Is there a performance impact when enabling this?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;There can be, but the secondary lookup only occurs for traffic that doesn't find an explicit policy match. For most environments, this results in a negligible impact on throughput, as the majority of traffic will hit your existing, optimized rules. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Can I use this on Prisma Access?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;Yes, this is a core Network Security feature available for both hardware/VM-Series NGFWs and Prisma Access. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: Can I use this on Strata Cloud Manager?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;No, while this functionality is only available on Panorama at the moment, we are working on supporting this feature for SCM customers in the future. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: What is the difference between “Previously Identified As” and “Previous App-ID”? Isn’t “Previously Identified As” already in the data attributes of an App?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: “&lt;/STRONG&gt;&lt;SPAN&gt;Previously Identified As” is a static metadata field in the App-ID database that tells you an app's history for informational purposes. Previous App-ID is a dynamic enforcement attribute used by the firewall's policy engine to bridge the gap during an update. While PIA helps you read about the change, the Safeguard uses the Previous App-ID attribute to actually apply your security intent.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: How is this different from the feature “Disable New App-IDs”?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;"Disable New App-IDs" completely turns off the signature, meaning the firewall stays blind to the new app and identifies it as the old one (e.g., still seeing 'ssl'). The App-ID Update Safeguard rather allows the firewall to identify the new app (e.g., 'acme-app') and log it correctly, while simply "borrowing" the policy action of the old app. This gives you the visibility you need to update your rules without the risk of an outage. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Q: What about the case in which a malicious app is defined from previous allowed content? Such as if “ssl” is changed to “malicious proxy” in a content update.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;A: &lt;/STRONG&gt;&lt;SPAN&gt;In cases where we define the app as malicious or if we deem it a more “security” oriented signature change, we will hold back the logic of Safeguard for that specific application. So if a malicious proxy tool was previously identified as ssl, we will not have a previous app-id for that new app to preserve security posture. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;STRONG&gt;Ready to Dive Deeper?&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For a technical breakdown, step-by-step configuration guides, and best practices for content deployment, feel free to check out the technical documentation:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt; Demo Video:&lt;BR /&gt;&lt;BR /&gt;&lt;IFRAME src="https://www.youtube.com/embed/Dq7KYdilxUs?si=Cce5u3UNXLh5Pzmf" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen" title="YouTube video player" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin"&gt;&lt;/IFRAME&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw/administration/app-id/app-id-update-safeguard" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://docs.paloaltonetworks.com/ngfw/administration/app-id/app-id-update-safeguard&amp;amp;source=gmail&amp;amp;ust=1772940750571000&amp;amp;usg=AOvVaw2duNaf4EGAGwv2qGreU3xD"&gt;Prevent Service Disruptions Using App-ID Update Safeguard&lt;/A&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw/administration/app-id/app-id-update-safeguard/monitor-rule-safeguard" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://docs.paloaltonetworks.com/ngfw/administration/app-id/app-id-update-safeguard/monitor-rule-safeguard&amp;amp;source=gmail&amp;amp;ust=1772940750571000&amp;amp;usg=AOvVaw38UVapXqttoUeY2sdTWsx6"&gt;Monitor Impacted Rules and Applications&lt;/A&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 09 Mar 2026 07:58:14 GMT</pubDate>
    <dc:creator>kbarker</dc:creator>
    <dc:date>2026-03-09T07:58:14Z</dc:date>
    <item>
      <title>Ensure Business Continuity with the New App-ID Update Safeguard</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/ensure-business-continuity-with-the-new-app-id-update-safeguard/ta-p/1249229</link>
      <description>&lt;P&gt;The new App-ID Update Safeguard in PAN-OS 12.1.5 (and later) provides a safety net for your security policy. By introducing a secondary lookup process, the firewall can now reference an application’s "Previous App-ID" to honor your original security intent even before you’ve manually updated your rules. This allows you to stay current with the latest threat signatures without the fear of unintended outages, giving you the visibility and time you need to audit your policies via new ACC widgets and log attributes.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 07:58:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/ensure-business-continuity-with-the-new-app-id-update-safeguard/ta-p/1249229</guid>
      <dc:creator>kbarker</dc:creator>
      <dc:date>2026-03-09T07:58:14Z</dc:date>
    </item>
  </channel>
</rss>

