Can you bring a more specific example? You can use an application filter to create a custom filter which is based on for example "all appid's which match subcategory:email" or "all appids which match characteristic:evavise" etc. These are dynamic and are based on the classification made by PA in the app-db (for example if PA removes Zimbra from the subcategory email then Zimbra will not be allowed/denied by your security rule using this particular filter next time the app-db updates or an administrator commits the ruleset). When you create an application group (compared to application filter) you select specific appid's to be put in your custom group. For example creating an application group named "server-mgmt" which will include appids: ssh, snmp, snmp-trap, syslog, ntp and ping. These are static (only the stuff you selected for your custom application group will be used) and will only change if an app-id change name or is completely removed (I think you will get an error during commit so you need to fix the application group who now points to an app-id which doesnt exists if that case would happen). Edit: The above is just for the appid stuff. You can then also setup custom service groups which means which ports (TCP/UDP/ICMP + port number) you which to allow for your security rule. If you use the custom application group "server-mgmt" as described earlier you can select "any" (which means all UDP/TCP ports will be open and flows will be killed once detected not belonging to any of the appid's selected for "server-mgmt" - in my opinion should be rarely used because you will expose the stuff you try to protect), service-default (based on the default ports which each appid claims to use) or custom (either specific UDP/TCP + port or by a custom service group in case you have a bunch of ports such as TCP22 + UDP161 + UDP162 + UDP514 + UDP123 + ICMP Echo-Request, ICMP Echo-Reply). Also note that the "server-mgmt" is just an example. In real life I would limit it down even further. Like snmp traps is usually sent FROM a server and not TO a server (except for the server collecting the snmp traps) and so on.
... View more