Company.com has an in-house application that the Palo Alto Networks device doesn’t identify correctly. A Threat Management Team member has mentioned that this in-house application is very sensitive and all traffic being identified needs to be inspected by the Content-ID engine.
Which method should company.com use to immediately address this traffic on a Palo Alto Networks device?
A . Create a custom Application without signatures, then create an Application Override policy that includes the source, Destination, Destination Port/Protocol and Custom Application of the traffic.
B . Wait until an official Application signature is provided from Palo Alto Networks.
C . Modify the session timer settings on the closest referanced application to meet the needs of the in-house application
D . Create a Custom Application with signatures matching unique identifiers of the in-house application traffic
Answer: D
Leave a Reply