Better way to block cloud storage uploading by app-id

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Palo Alto Networks Approved
Palo Alto Networks Approved
Community Expert Verified
Community Expert Verified

Better way to block cloud storage uploading by app-id

L1 Bithead

Hello, we would like to block cloud storage uploading by app-ID. So you can go to dropbox and download files, but security wants us to block our users ability to upload files.

 

Our solution is go create a custom application group, like the attached photo, and go in and manually add known cloud storage app-id's for uploading. Then create a security policy that would block said custom application group.

 

My question is, is there a better way to do this? Fear being a new dropbox software company comes out, we will have to continuously update the custom application group with new services that come out to continue to be able to block uploading. Is there a way to block cloud storage app-id's as a whole, for uploading?

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

there's multiple ways to address this

continuing on the recommendation of @JayGolf  I'd actually create a security rule that has online storage as a destination category (in addition to or instead of the url filtering)

online storage.png

 

you can also create an application filter that will automatically update itself whenever a new app-id comes up that matches your criteria. the below example matches filesharing, but only the uploading bits (if you take away the 'uploading' tag, it matches all filesharing):

 

no-filesharing-uploading.png

 

 

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

View solution in original post

4 REPLIES 4

Community Team Member

Hi @TravisFleming ,

 

Another way that comes to mind is creating a custom URL category with type being "Category Match". you can then add "Online-Storage-and-Backup" or any other category you find that matches the URLs you're hoping to block. Once created, you can specify this custom url category in your active url filtering profile as a block or alert. 

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

Cyber Elite
Cyber Elite

there's multiple ways to address this

continuing on the recommendation of @JayGolf  I'd actually create a security rule that has online storage as a destination category (in addition to or instead of the url filtering)

online storage.png

 

you can also create an application filter that will automatically update itself whenever a new app-id comes up that matches your criteria. the below example matches filesharing, but only the uploading bits (if you take away the 'uploading' tag, it matches all filesharing):

 

no-filesharing-uploading.png

 

 

 

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

This is perfect thank you!

Iam doing via file block profile instead of above suggestions as in the above explained type we need to set deny action in security rule but by using file blocking profile is not working ,Can someone help me suggest some idea in this case?

  • 1 accepted solution
  • 4735 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!