<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practice for blacklisting App-IDs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76952#M42472</link>
    <description>&lt;P&gt;I think you have a good grasp of the issues with both approaches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The whitelist only that which is allowed does can be difficult to implement the first time. &amp;nbsp;This is especially true on a large or diverse user base. &amp;nbsp;Finding out all the allowed applications and getting them onto the white list can take time. &amp;nbsp;And in the process impede productivity and generate anger at IT in the user base along with a lot of help desk tickets. &amp;nbsp;But companies use this approach because it will give them the best protection and visibility in the long run. &amp;nbsp;And once the white list is finalized there are fewer hours spent because the policies are well known by this point and only need to change with new application needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The blacklist approach gives you a quick start to stopping the higher risk behavior. &amp;nbsp;But as you note this can also be a permanent work load basically never ends. &amp;nbsp;You have to keep up to date and review the new applications even after you have done the first task of choosing amoung the thousands of apps which to block.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically every company has to choose the appoarch that will work best for their situation.&lt;/P&gt;</description>
    <pubDate>Sun, 24 Apr 2016 11:40:16 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2016-04-24T11:40:16Z</dc:date>
    <item>
      <title>Best practice for blacklisting App-IDs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76892#M42461</link>
      <description>&lt;P&gt;What is the best practice for blacklisting potentially harmful Application ID's(from "trust" to "untrust" over 80/443)?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I started blocking on specific App-ID's, but maintaining this blacklist per App-ID will be kind of cumbersome.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm thinking about using Application Filters to block based on Application subcategory. &amp;nbsp;The only issue here is if I wanted to block say the "encrypted-tunnel", it will block common applications like "ssl".&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 14:35:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76892#M42461</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2016-04-22T14:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for blacklisting App-IDs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76894#M42463</link>
      <description>&lt;P&gt;Hi jambulo,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ideally you would want to allow only the applications you want in your network, everything else will fall down to the default interzone rule and be denied. If you implement decryption then you'll have better visibility on the 443 SSL applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps,&lt;/P&gt;
&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 14:53:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76894#M42463</guid>
      <dc:creator>bmorris1</dc:creator>
      <dc:date>2016-04-22T14:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for blacklisting App-IDs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76900#M42465</link>
      <description>&lt;P&gt;When allowing your users out to the internet, are you specifying each App-ID that they can use? Or do you allow anything on 80/443, then block the known bad App-IDs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ideally, it would be nice to specify each App-ID allowed out to the internet, but that would be a management nightmare.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 17:47:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76900#M42465</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2016-04-22T17:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for blacklisting App-IDs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76945#M42469</link>
      <description>&lt;P&gt;Given that Palo can classify over 2400 applications it seems you'd be better off "Whitelsiting" applications versus trying to blacklist them.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Apr 2016 03:29:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76945#M42469</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2016-04-24T03:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for blacklisting App-IDs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76952#M42472</link>
      <description>&lt;P&gt;I think you have a good grasp of the issues with both approaches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The whitelist only that which is allowed does can be difficult to implement the first time. &amp;nbsp;This is especially true on a large or diverse user base. &amp;nbsp;Finding out all the allowed applications and getting them onto the white list can take time. &amp;nbsp;And in the process impede productivity and generate anger at IT in the user base along with a lot of help desk tickets. &amp;nbsp;But companies use this approach because it will give them the best protection and visibility in the long run. &amp;nbsp;And once the white list is finalized there are fewer hours spent because the policies are well known by this point and only need to change with new application needs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The blacklist approach gives you a quick start to stopping the higher risk behavior. &amp;nbsp;But as you note this can also be a permanent work load basically never ends. &amp;nbsp;You have to keep up to date and review the new applications even after you have done the first task of choosing amoung the thousands of apps which to block.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically every company has to choose the appoarch that will work best for their situation.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Apr 2016 11:40:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-practice-for-blacklisting-app-ids/m-p/76952#M42472</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-04-24T11:40:16Z</dc:date>
    </item>
  </channel>
</rss>

