<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Application override with custom application and threat detection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89184#M43525</link>
    <description>&lt;P&gt;I want to build a custom application with application override and still be able to scan for threats.&lt;BR /&gt;On the website of Palo Alto, there is this text:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If you define an application override, the firewall stops processing at Layer-4. The custom application name is assigned to the session to help identify it in the logs, and the traffic is not scanned for threats&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But there is also this text:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;For example, if you build a custom application that triggers on a host header &lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;, the packets are first identified as web-browsing and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created a test custom application "web_override" with a signature:&amp;nbsp; http-req-host-header eicar\.org&lt;BR /&gt;I enabled the parent-app option set on web-browsing. Only when I disable the override, the eicar virus is recognized. When I enable the override the layer 7 is not scanned and Eicar will not trigger a threat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also vind this text:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In such cases, we recommended creating an application override to allow easier identification and reporting, and to prevent confusion.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can somebody explain why? "To prevent confusion'' what for confusion are they talking about. When I have a unknown application (in my test the eicar web site is normaly &lt;SPAN&gt;recognized&lt;/SPAN&gt; as web-browsing, but after my custom application the firewall sees the trafic as my custom application "web_override"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I vind good &lt;SPAN&gt;articles with good information put still missing some pieces of the puzzle.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 19 Jun 2016 07:53:20 GMT</pubDate>
    <dc:creator>RedLogic-team</dc:creator>
    <dc:date>2016-06-19T07:53:20Z</dc:date>
    <item>
      <title>Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89184#M43525</link>
      <description>&lt;P&gt;I want to build a custom application with application override and still be able to scan for threats.&lt;BR /&gt;On the website of Palo Alto, there is this text:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If you define an application override, the firewall stops processing at Layer-4. The custom application name is assigned to the session to help identify it in the logs, and the traffic is not scanned for threats&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But there is also this text:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;For example, if you build a custom application that triggers on a host header &lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;, the packets are first identified as web-browsing and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created a test custom application "web_override" with a signature:&amp;nbsp; http-req-host-header eicar\.org&lt;BR /&gt;I enabled the parent-app option set on web-browsing. Only when I disable the override, the eicar virus is recognized. When I enable the override the layer 7 is not scanned and Eicar will not trigger a threat.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also vind this text:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;In such cases, we recommended creating an application override to allow easier identification and reporting, and to prevent confusion.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can somebody explain why? "To prevent confusion'' what for confusion are they talking about. When I have a unknown application (in my test the eicar web site is normaly &lt;SPAN&gt;recognized&lt;/SPAN&gt; as web-browsing, but after my custom application the firewall sees the trafic as my custom application "web_override"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I vind good &lt;SPAN&gt;articles with good information put still missing some pieces of the puzzle.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 07:53:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89184#M43525</guid>
      <dc:creator>RedLogic-team</dc:creator>
      <dc:date>2016-06-19T07:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89229#M43528</link>
      <description>&lt;P&gt;Could you provide the link to the original source document for your quoted paragraphs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd like to see the full context that might help explain the apparent contradictions.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 14:46:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89229#M43528</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-06-19T14:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89264#M43530</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using Application Override (Policies -&amp;gt; Application Override), then traffic will not go through L7 analysis and threats will no be scanned. Basically, you create a custom application, but do not create any signature for it and identification is done&amp;nbsp;via Application Override.&lt;/P&gt;
&lt;P&gt;If you are using Custom Application and identifying your app by custom signature - it will go through threat scanning if you have enabled it for that app. It is done by opening your custom application and editing Advanced tab, Scanning section. For this scenario no Application Override is required.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 19:40:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89264#M43530</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-19T19:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89265#M43531</link>
      <description>&lt;P&gt;The text:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT face="Helvetica"&gt;&lt;SPAN style="color: rgb(72, 82, 90); text-transform: none; line-height: 22.85px; text-indent: 0px; letter-spacing: normal; font-family: Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-variant: normal; font-weight: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;For example, if you build a custom application that triggers on a host header&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;&lt;SPAN style="color: rgb(72, 82, 90); text-transform: none; line-height: 22.85px; text-indent: 0px; letter-spacing: normal; font-size: 16px; font-variant: normal; font-weight: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;, the packets are first identified as&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;web-browsing&lt;SPAN style="color: rgb(72, 82, 90); text-transform: none; line-height: 22.85px; text-indent: 0px; letter-spacing: normal; font-family: Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-variant: normal; font-weight: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;comes from this article;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/manage-custom-or-unknown-applications" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/manage-custom-or-unknown-applications&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The text:&lt;/P&gt;
&lt;H4 style="font: bold 14px/20px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&lt;EM&gt;Example Use Scenario&lt;/EM&gt;&lt;/H4&gt;
&lt;P style="font: 14px/21px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&lt;EM&gt;&lt;SPAN style="line-height: 1.2; box-sizing: inherit;"&gt;You might ask why we'd ever need to override the normal application identification process. In some cases, customers&amp;nbsp;build their own custom applications to address specific needs unique to the company. For these applications, we may not have signatures to properly identify the expected behavior and identify the traffic with a known application. In such cases, we recommended creating an application override to allow easier identification and reporting, and to prevent confusion.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P style="font: 14px/21px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font: 14px/21px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&lt;SPAN style="line-height: 1.2; box-sizing: inherit;"&gt;comes from this article;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font: 14px/21px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font: 14px/21px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&lt;SPAN style="line-height: 1.2; box-sizing: inherit;"&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Tips-amp-Tricks-How-to-Create-an-Application-Override/ta-p/65513" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/Tips-amp-Tricks-How-to-Create-an-Application-Override/ta-p/65513&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="font: 14px/21px Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; margin: 0px; padding: 0px; text-align: left; color: rgb(51, 51, 51); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; box-sizing: inherit; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;I also read this info:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-Policy/ta-p/60044" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-Policy/ta-p/60044&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 20:53:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89265#M43531</guid>
      <dc:creator>RedLogic-team</dc:creator>
      <dc:date>2016-06-19T20:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89266#M43532</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;@Vieplis wrote:&lt;BR /&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using Application Override (Policies -&amp;gt; Application Override), then traffic will not go through L7 analysis and threats will no be scanned. Basically, you create a custom application, but do not create any signature for it and identification is done&amp;nbsp;via Application Override.&lt;/P&gt;
&lt;P&gt;If you are using Custom Application and identifying your app by custom signature - it will go through threat scanning if you have enabled it for that app. It is done by opening your custom application and editing Advanced tab, Scanning section. For this scenario no Application Override is required.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Explain:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The text:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT face="Helvetica"&gt;&lt;SPAN style="color: rgb(72, 82, 90); text-transform: none; line-height: 22.85px; text-indent: 0px; letter-spacing: normal; font-family: Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-variant: normal; font-weight: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;For example, if you build a custom application that triggers on a host header&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;&lt;SPAN style="color: rgb(72, 82, 90); text-transform: none; line-height: 22.85px; text-indent: 0px; letter-spacing: normal; font-size: 16px; font-variant: normal; font-weight: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;, the packets are first identified as&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;web-browsing&lt;SPAN style="color: rgb(72, 82, 90); text-transform: none; line-height: 22.85px; text-indent: 0px; letter-spacing: normal; font-family: Lato, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-variant: normal; font-weight: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;comes from this article;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/manage-custom-or-unknown-applications" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/app-id/manage-custom-or-unknown-applications&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jun 2016 20:55:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89266#M43532</guid>
      <dc:creator>RedLogic-team</dc:creator>
      <dc:date>2016-06-19T20:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89267#M43533</link>
      <description>&lt;P&gt;As far as I understand it&amp;nbsp;explains the situation when application override is not used, and it makes more sense if you look at one more paragraph further from the same article where it tells how to make an exception by using application override:&lt;/P&gt;
&lt;DIV class="parbase xml_bullet-Indent_8 xml"&gt;
&lt;DIV class="bullet-Indent"&gt;&lt;EM&gt;For example, if you build a custom application that triggers on a host header &lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;, the packets are first identified as web-browsing and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/EM&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="parbase xml_bullet-Indent_9 xml"&gt;
&lt;DIV class="bullet-Indent"&gt;&lt;EM&gt;&lt;A id="pgfId-1010594" target="_blank"&gt;&lt;/A&gt;If you define an application override, the firewall stops processing at Layer-4. The custom application name is assigned to the session to help identify it in the logs, and the traffic is not scanned for threats&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sun, 19 Jun 2016 21:28:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89267#M43533</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-19T21:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89436#M43536</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;@Vieplis wrote:&lt;BR /&gt;
&lt;P&gt;As far as I understand it&amp;nbsp;explains the situation when application override is not used, and it makes more sense if you look at one more paragraph further from the same article where it tells how to make an exception by using application override:&lt;/P&gt;
&lt;DIV class="parbase xml_bullet-Indent_8 xml"&gt;
&lt;DIV class="bullet-Indent"&gt;&lt;EM&gt;For example, if you build a custom application that triggers on a host header &lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;, the packets are first identified as web-browsing and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/EM&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="parbase xml_bullet-Indent_9 xml"&gt;
&lt;DIV class="bullet-Indent"&gt;&lt;EM&gt;&lt;A id="pgfId-1010594" target="_blank"&gt;&lt;/A&gt;If you define an application override, the firewall stops processing at Layer-4. The custom application name is assigned to the session to help identify it in the logs, and the traffic is not scanned for threats&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Oke I understand what you are saying. But the guy who wrote is article is not clear how he explains stuf:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Alternatively, if you would like the firewall to process the custom application using fast path (Layer-4 inspection instead of using App-ID for Layer-7 inspection), you can reference the custom application in an application override policy rule. An application override with a custom application will prevent the session from being processed by the App-ID engine, which is a Layer-7 inspection. Instead it forces the firewall to handle the session as a regular stateful inspection firewall at Layer-4, and thereby saves application processing time.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This part he talkes about fast path: Application override with layer 4 and not layer 7, but then he starts with de words "For example" This makes it confusing, when you say "For example" you refers to the text above with telling me about override.&lt;/P&gt;
&lt;P&gt;So The text must be "If you build a custom application without override" But then, the text is strange, there is an option in custom application to enable scanning threats.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="parbase xml_bullet-Indent_8 xml"&gt;
&lt;DIV class="bullet-Indent"&gt;&lt;A id="pgfId-1010623" target="_blank"&gt;&lt;/A&gt; &lt;EM&gt;For example, if you build a custom application that triggers on a host header &lt;A href="http://www.mywebsite.com" target="_blank"&gt;www.mywebsite.com&lt;/A&gt;, the packets are first identified as web-browsing and then are matched as your custom application (whose parent application is web-browsing). Because the parent application is web-browsing, the custom application is inspected at Layer-7 and scanned for content and vulnerabilities.&lt;/EM&gt;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;Put all things together,&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;1. Costum application can be scanned in to layer 7 without application override, you need some signature to recognize the application. &amp;nbsp;In the custom app settings&amp;nbsp;=&amp;gt; tab advanced =&amp;gt; scanning option you can scan on threats.&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;2. Custom application with an override can do only layer 4 no threat detection.&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;3.&amp;nbsp;Applications that exist in Palo Alto can have a override when you want to use a different port, example: I use this for ldaps port 636 (else it will drop with&amp;nbsp;Not-applicable warning). You can scan on threats with existing apps in combination with an override (Correct me if I wrong).&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;So I have an extra question, is there a website on the internet that triggers an Unknown-tcp/upd in the application detection so you can practice to build a custom application. Or is there a simple Linux application that does?&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;Thanks Vieplis for your input&lt;/DIV&gt;
&lt;DIV class="bullet-Indent"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Jun 2016 06:30:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/89436#M43536</guid>
      <dc:creator>RedLogic-team</dc:creator>
      <dc:date>2016-06-20T06:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: Application override with custom application and threat detection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/90438#M43573</link>
      <description>&lt;P&gt;Your summary points 1 and 2 seems correct to me. One note though about 3 -&amp;nbsp;yes, existing app with application override will still trigger L7 inspection, but I think there is no really&amp;nbsp;need to simply change port for a predefined app as even if the application will suddenly be using different port, Palo Alto will still identify it with its App-ID engine (SSL decryption may be required tho for encrypted traffic) and security rules have to be build accordingly to use that custom port number (not the service-default) for that application to allow it through.&lt;/P&gt;&lt;P&gt;And note from PA guys I've kept in mind:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-Policy/ta-p/60044&amp;nbsp;" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Create-an-Application-Override-Policy/ta-p/60044&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; It is recommended to use a Custom Application to verify that the application override is identifying the traffic at the new custom app, as designed. Use of a pre-existing application can cause problems, and may not work properly in an application override rule.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding application signature testing, well, I have not found a way to test it nice and easy. Description of the&amp;nbsp;fields to be examined from the captures can be found here:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Documentation-Articles/Creating-Custom-Threat-Signatures/ta-p/58569" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Documentation-Articles/Creating-Custom-Threat-Signatures/ta-p/58569&lt;/A&gt; That works as a reference and usually checking PCAPs and looking for relevant informaiton to match against.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anyone has a way of testing it nicely, would be nice to hear.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 13:36:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override-with-custom-application-and-threat/m-p/90438#M43573</guid>
      <dc:creator>nikoo</dc:creator>
      <dc:date>2016-06-21T13:36:10Z</dc:date>
    </item>
  </channel>
</rss>

