<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Override in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297527#M78076</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;If you stick with the default application, add the new port(s) to service in the same security rule (instead of using application-default), then the threat protection is working as expected.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Nov 2019 15:13:17 GMT</pubDate>
    <dc:creator>JoergSchuetter</dc:creator>
    <dc:date>2019-11-10T15:13:17Z</dc:date>
    <item>
      <title>Application Override</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297520#M78075</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have an application override setup and it is working fine.&amp;nbsp; The reason for the override is because we changed the port number of the application to something other than the default.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way I have this setup is I created a customer application and then setup an application override policy.&lt;/P&gt;&lt;P&gt;My question deals with the override policy.&amp;nbsp; I have the policy currently pointing to the customer application I created.&amp;nbsp; I understand that by doing this, threat protection is bypassed.&amp;nbsp; Since there is a built-in application for what I want, should I be selecting that instead of the custom application that was created.? My gut says yes.&amp;nbsp; My only hesitation is that the built-in app assumes the original port number and not the one that I need.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will using the build-in application in the policy still allow me to use the non-standard port and achieve threat protection?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 14:32:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297520#M78075</guid>
      <dc:creator>sgoethals</dc:creator>
      <dc:date>2019-11-10T14:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Application Override</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297527#M78076</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;If you stick with the default application, add the new port(s) to service in the same security rule (instead of using application-default), then the threat protection is working as expected.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 15:13:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297527#M78076</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2019-11-10T15:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: Application Override</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297528#M78077</link>
      <description>&lt;P&gt;We also have some applications that are using ports other than the standard ports. What we have done is to change the rule associated with the application to use the standard application and we set the specific ports we are using as the service in that rule. This way we get the traffic identified and limit it to our ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Nov 2019 16:47:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/application-override/m-p/297528#M78077</guid>
      <dc:creator>BruceBennett</dc:creator>
      <dc:date>2019-11-10T16:47:15Z</dc:date>
    </item>
  </channel>
</rss>

