<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Better way to block cloud storage uploading by app-id in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556594#M561</link>
    <description>&lt;P&gt;Hello, we would like to block cloud storage uploading by app-ID. So you can go to dropbox and download files, but security wants us to block our users ability to upload files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our solution is go create a custom application group, like the attached photo, and go in and manually add known cloud storage app-id's for uploading. Then create a security policy that would block said custom application group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is, is there a better way to do this? Fear being a new dropbox software company comes out, we will have to continuously update the custom application group with new services that come out to continue to be able to block uploading. Is there a way to block cloud storage app-id's as a whole, for uploading?&lt;/P&gt;</description>
    <pubDate>Tue, 05 Sep 2023 19:50:57 GMT</pubDate>
    <dc:creator>TravisFleming</dc:creator>
    <dc:date>2023-09-05T19:50:57Z</dc:date>
    <item>
      <title>Better way to block cloud storage uploading by app-id</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556594#M561</link>
      <description>&lt;P&gt;Hello, we would like to block cloud storage uploading by app-ID. So you can go to dropbox and download files, but security wants us to block our users ability to upload files.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our solution is go create a custom application group, like the attached photo, and go in and manually add known cloud storage app-id's for uploading. Then create a security policy that would block said custom application group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is, is there a better way to do this? Fear being a new dropbox software company comes out, we will have to continuously update the custom application group with new services that come out to continue to be able to block uploading. Is there a way to block cloud storage app-id's as a whole, for uploading?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 19:50:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556594#M561</guid>
      <dc:creator>TravisFleming</dc:creator>
      <dc:date>2023-09-05T19:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: Better way to block cloud storage uploading by app-id</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556818#M562</link>
      <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/286624"&gt;@TravisFleming&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another way that comes to mind is creating a custom URL category with type being "Category Match". you can then add "Online-Storage-and-Backup" or any other category you find that matches the URLs you're hoping to block. Once created, you can specify this custom url category in your active url filtering profile as a block or alert.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 18:32:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556818#M562</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-09-06T18:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Better way to block cloud storage uploading by app-id</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556943#M563</link>
      <description>&lt;P&gt;there's multiple ways to address this&lt;/P&gt;
&lt;P&gt;continuing on the recommendation of&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt;&amp;nbsp; I'd actually create a security rule that has online storage as a destination category (in addition to or instead of the url filtering)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="online storage.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53507iAC92A9696E9E3FA6/image-size/large?v=v2&amp;amp;px=999" role="button" title="online storage.png" alt="online storage.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can also create an application filter that will automatically update itself whenever a new app-id comes up that matches your criteria. the below example matches filesharing, but only the uploading bits (if you take away the 'uploading' tag, it matches all filesharing):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="no-filesharing-uploading.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/53508i892CE82A6D6975FC/image-size/large?v=v2&amp;amp;px=999" role="button" title="no-filesharing-uploading.png" alt="no-filesharing-uploading.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 08:48:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/556943#M563</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-09-07T08:48:03Z</dc:date>
    </item>
    <item>
      <title>Re: Better way to block cloud storage uploading by app-id</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/557013#M564</link>
      <description>&lt;P&gt;This is perfect thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 15:48:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/557013#M564</guid>
      <dc:creator>TravisFleming</dc:creator>
      <dc:date>2023-09-07T15:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Better way to block cloud storage uploading by app-id</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/998941#M1039</link>
      <description>&lt;P&gt;Iam doing via file block profile instead of above suggestions as in the above explained type we need to set deny action in security rule but by using file blocking profile is not working ,Can someone help me suggest some idea in this case?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Dec 2024 12:40:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/better-way-to-block-cloud-storage-uploading-by-app-id/m-p/998941#M1039</guid>
      <dc:creator>kushkussa</dc:creator>
      <dc:date>2024-12-19T12:40:45Z</dc:date>
    </item>
  </channel>
</rss>

