While Palo Alto Networks provides extensive, regularly updated libraries for application identification (App-ID) and threat signatures, there are situations where organizations need to define their own custom classifications. PAN-OS allows administrators to create Custom Application Signatures (often called "Custom Apps") and Custom Threat Signatures .
Understanding how to create and apply these custom objects is crucial for tailoring the firewall's capabilities to specific organizational needs and threat landscapes.
Create a Custom Application when:
Important Distinction: Unlike Application Override (which bypasses App-ID), Custom Applications *integrate* with the App-ID engine. The firewall uses the custom signature definition within the App-ID framework to classify the traffic.
Objects > Applications
, then click 'Add'.
application-default
if you defined standard ports, or specify the custom port if necessary.
Create Custom Threat Signatures when:
Objects > Custom Objects > [Threat Type]
Creating a custom threat signature does **NOT** automatically enable detection. You must actively apply it:
Objects > Security Profiles > Anti-Spyware
. Edit or create a profile.
Objects > Security Profiles > Vulnerability Protection
. Edit or create a profile.
graph TD A["Create Custom Threat Signature - Objects to Custom Objects"] --> B{"Edit Security Profile - Anti-Spyware or Vulnerability Protection"}; B -- "Enable Threat ID & Set Action" --> C["Security Profile Includes Custom Threat"]; C --> D{"Attach Profile to Security Policy Rule - Policies to Security"}; D -- "Inspects Allowed Traffic" --> E["Firewall Engine Detects Custom Threat"]; style A fill:#fdebd0,stroke:#f5b041,stroke-width:2px style C fill:#d5f5e3,stroke:#58d68d,stroke-width:2pxApplying a Custom Threat Signature via a Security Profile.
For the PCNSE exam, understand:
1. What is the primary reason to create a Custom Application Signature in PAN-OS?
2. Where are Custom Application Signatures configured in the PAN-OS GUI?
3. How are Custom Threat Signatures (e.g., custom spyware) typically activated to inspect traffic?
4. What is a major difference between using a Custom Application signature and an Application Override policy?
5. Which component is used in Security Policy rules to allow or block traffic identified by a Custom Application signature?
6. Creating a very broad custom threat signature pattern (e.g., matching "password") can lead to which negative consequences?
7. Where are Custom Spyware and Custom Vulnerability signatures configured?
8. What information is typically NOT defined within a Custom Application signature itself?
9. Setting the 'Severity' (e.g., Critical, High) is a key parameter when creating which type of custom object?
10. What is a crucial best practice after creating either a Custom Application or a Custom Threat Signature?