<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using App-ID to block in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328842#M83540</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In your current RDP policy, does it have ms-rdp and any as the service? Maybe a snippet of the policy you are working with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise,&lt;/P&gt;</description>
    <pubDate>Tue, 19 May 2020 21:13:41 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2020-05-19T21:13:41Z</dc:date>
    <item>
      <title>Using App-ID to block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328595#M83511</link>
      <description>&lt;P&gt;I have a question about using App-ID. &amp;nbsp;Can you block an application just by using APP-ID. &amp;nbsp;I have a situation where my firewall is in a default allow environment. &amp;nbsp;I know this isn't a best practice but it is a complex environment and there are a lot of politics so it is what it is. &amp;nbsp;Anyway, I tried to block a service based on App-ID and it is not working as I had hoped. &amp;nbsp;The request was to block RDP regardless of port. &amp;nbsp;In theory App-ID should be able to do this right, if it is identifying the applications regardless of port, it should be able to block them. &amp;nbsp;However what I get is it seems to block them on port 3389 (default RDP port) but everything else it just marks as incomplete or insufficient data either way blocking it. &amp;nbsp;So it kind of creates the default block which won't work in the situation. &amp;nbsp;If I add application default then it only looks at 3389 and blocks that. &amp;nbsp;But if someone is using a non standard port for RDP then they go on business as usual and the FW won't block that. &amp;nbsp;All the documentation I can find about this doesn't spell out that App-ID only works in a positive enforcement model with a default deny. &amp;nbsp;I would love to find something that says that so I can block 3389 and move on with life and possibly push towards positive enforcement, but that's another story. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any help in advance!&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 19:46:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328595#M83511</guid>
      <dc:creator>jdemares</dc:creator>
      <dc:date>2020-05-18T19:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using App-ID to block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328619#M83518</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes, the PAN can do this. However there are a few things you have to remember.&lt;/P&gt;&lt;P&gt;1. the applications the PAN knows have a list of default ports&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;A href="https://applipedia.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;https://applipedia.paloaltonetworks.com/&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ms-rdp.jpg" style="width: 576px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25683iD65A5312E9B1F2B8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ms-rdp.jpg" alt="ms-rdp.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;So in your case the firewall is working as expected only blocking the RDP application on port 3389.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Since you want top block it on all ports, you'll need to change the 'Service' to ANY. What the 'Service' is the 'Port'. If you list only the application, it will use what the PAN has builtin. Selecting ANY will block ms-rdp on all ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 21:55:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328619#M83518</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-05-18T21:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: Using App-ID to block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328839#M83539</link>
      <description>&lt;P&gt;Thank you for the response. &amp;nbsp;Maybe I wasn't clear which part I was having trouble with. &amp;nbsp;The problem was when I had the service on any port it was seeing everything as RDP (not port but service.) &amp;nbsp;The problem was I didn't have any rules looking at App-ID above this rule so it was the first rule to try to use App-ID and the last rule before the allow all. &amp;nbsp;So what I did was put some rules above it to start the App-ID, ping as a service on any port and ping as a service with application default in allow and that seems to work to identify a lot of the traffic. &amp;nbsp;I think I need to do some fine tuning but this is what I was looking for. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Joe&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 21:03:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328839#M83539</guid>
      <dc:creator>jdemares</dc:creator>
      <dc:date>2020-05-19T21:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using App-ID to block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328842#M83540</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In your current RDP policy, does it have ms-rdp and any as the service? Maybe a snippet of the policy you are working with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise,&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2020 21:13:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/328842#M83540</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-05-19T21:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using App-ID to block</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/332710#M84098</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using APP-ID default port is recomended also you can set service port to force allowed application to use specific port.&lt;/P&gt;&lt;P&gt;My suggestion Create a application based rule with identical action before your old rule and monitor them what is hitting.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After your rule table is clean you can create and enfor application filter and groups to block unwanted application which your company requires.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jun 2020 06:55:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-app-id-to-block/m-p/332710#M84098</guid>
      <dc:creator>upelister</dc:creator>
      <dc:date>2020-06-10T06:55:11Z</dc:date>
    </item>
  </channel>
</rss>

