Introducing AI Access Security

PCNSE/PCNSA Focus: Understand the fundamental purpose of AI Access Security, the problems it solves (data leakage, shadow AI), and its core pillars (Identify/Control, Visibility/Reporting, Data Protection). Know the supported platforms and licensing models.

Generative AI (GenAI) applications are AI apps capable of generating text, images, videos, and other data in response to user prompts, continuously learning from inputs. While offering opportunities, their usage presents new security dangers: ensuring employees don't expose sensitive or proprietary data to GenAI apps.

Palo Alto Networks introduced AI Access Security to enable businesses to safely adopt GenAI apps by mitigating risks associated with data leakage in prompts and malicious content in responses. It includes:

AI Access Security Dashboard Overview

AI Access Security follows core principles for safe GenAI leverage:

Identify and Control GenAI Apps

Provides robust tools to identify and control GenAI app usage.

PCNSE/PCNSA Focus: Understand how AI Access Security identifies GenAI apps (dynamic content updates, ACE) and the methods available for controlling access (policy rules, attributes, user groups, functions).

Comprehensive Visualization and Reporting

Managed on Strata Cloud Manager for a single pane of glass experience.

PCNSE/PCNSA Focus: Know that Strata Cloud Manager is the primary management interface and the types of visibility provided (dashboards, user activity, app dictionary, reports).

Data Protection

Provides data protection, posture management, and zero trust security.

PCNSE/PCNSA Focus: Understand the critical role of Enterprise DLP in AI Access Security's data protection. Know that it uses data patterns and profiles and can inspect both prompts (exfiltration) and responses (threats).

What's Supported with AI Access Security?

PCNSE/PCNSA Focus: Understand the prerequisites for using AI Access Security features, especially minimum PAN-OS/dataplane versions and required plugins/services (E-DLP, Cloud Services Plugin, Strata Logging Service). Know the different GenAI app use cases and associated risks.

Gotcha: Not all GenAI apps are supported by Enterprise DLP for sensitive data inspection. Know how to identify which ones are and the fallback (blocking access).

AI Access Security gives you visibility into hundreds of generative AI (GenAI) apps grouped into predefined Use Cases .

Traffic for these apps is visible in the Activity Insights dashboard.

Enterprise Data Loss Prevention (E-DLP) powers sensitive data prevention for supported GenAI apps. Prerequisites for using Enterprise DLP with GenAI apps:

If E-DLP doesn't support a GenAI app, you can block access to it via policy rules if it's not sanctioned.

Use Cases

Safely adopt GenAI apps based on predefined use cases and associated risks.

PCNSE/PCNSA Focus: Be able to identify key risks associated with different categories (use cases) of GenAI applications. This is often tested in scenario-based questions.

SaaS Security Integration

PCNSE/PCNSA Focus: Understand how AI Access Security leverages other SaaS Security components (Inline, Data Security, SSPM) for comprehensive protection and visibility across SaaS apps, not just GenAI.

SaaS Security (Inline, Data Security, SSPM) provides an integrated CASB solution.

AI Access Security Setup Prerequisites

PCNSE/PCNSA Focus: Critical section! Memorize the minimum PAN-OS versions, required plugins (E-DLP, Cloud Services), and logging service (Strata Logging Service) for *both* AI Access Security only AND CASB-PA/X scenarios, and across Panorama/Strata Cloud Manager management. Understand the implications of different licenses on included functionality.

Gotcha: The minimum PAN-OS/Dataplane version varies depending on which license you have (AI Access Security vs. CASB-PA/X) and the management method (Panorama vs. Strata Cloud Manager) AND the Prisma Access version (Preferred vs. Innovation). Pay close attention to these details.

Review the minimum PAN-OS and Prisma Access dataplane versions, and additional services required.

Functionality depends on licenses and PAN-OS/dataplane versions. Refer to the AI Access Security Licenses section for more details on included functionality.

NGFW and Prisma Access (Managed by Panorama)

Prerequisites when managed by Panorama.

Prerequisite AI Access Security License CASB-PA and CASB-X Licenses
PAN-OS or dataplane PAN-OS 11.2.2-h1
  • PAN-OS 10.2.3 and Prisma Access 5.0 Preferred and Innovation
  • PAN-OS 11.1.0 and Prisma Access 5.1 Preferred
  • PAN-OS 11.2.2-h1 and Prisma Access 5.1 Innovation
Review Prisma Access Release Notes for specifics.
Data Filtering Enterprise DLP plugin 5.0.4 or later Review Compatibility Matrix for supported Enterprise DLP plugin versions.
AI Access Security includes Enterprise DLP when you activate AI Access Security, CASB-PA, and CASB-X licenses.
Cloud Services Plugin Cloud Services plugin 5.1
Logging Strata Logging Service

NGFW and Prisma Access (Managed by Strata Cloud Manager)

PCNSE/PCNSA Focus: Note the slight differences in prerequisites when managed by Strata Cloud Manager vs. Panorama (e.g., no separate Cloud Services plugin mention explicitly for Strata Cloud Manager in the table, but it's integrated).

Prerequisites when managed by Strata Cloud Manager.

Prerequisite AI Access Security License CASB-PA and CASB-X Licenses
PAN-OS or dataplane PAN-OS 11.2.2-h1
  • PAN-OS 10.2.3 and Prisma Access 5.0 Preferred and Innovation
  • PAN-OS 11.1.0 and Prisma Access 5.1 Preferred
  • PAN-OS 11.2.2-h1 and Prisma Access 5.1 Innovation
Review Prisma Access Release Notes for specifics.
Data Filtering AI Access Security includes Enterprise DLP when you activate AI Access Security, CASB-PA, and CASB-X licenses.
Logging Strata Logging Service

AI Access Security Licenses

PCNSE/PCNSA Focus: Know the different license types (AI Access Security, CASB-PA, CASB-X) and which ones include AI Access Security functionality. Understand the basic differences between AI Access Security only vs. having CASB-PA/X active, especially regarding DLP scope and visibility.

Gotcha: The scope of DLP inspection for non-GenAI apps depends on whether you *only* have the AI Access Security license or also have Enterprise DLP or CASB-PA/X licenses active.

AI Access Security can be used with NGFW and Prisma Access , managed by Panorama or Strata Cloud Manager .

Requires one of the following licenses: AI Access Security , CASB-PA , or CASB-X .

AI Access Security License

A standalone license with three types:

CASB-PA and CASB-X

AI Access Security is included by default with CASB-PA and CASB-X licenses. No additional action needed for activation if CASB-PA or CASB-X is active.

What's Included with an AI Access Security License?

Included functionality depends on other active licenses and the PAN-OS/dataplane version (refer to Setup Prerequisites ).

AI Access Security only

When only the AI Access Security license is active (on NGFW/Prisma Access managed by Panorama or Strata Cloud Manager).

PAN-OS or Dataplane Version NGFW and Prisma Access (Managed by Panorama or Strata Cloud Manager)
11.2.2-h1 and later
Prisma Access 5.1 Innovation
  • Visibility into over 2,250 GenAI apps via dynamic content updates and App-ID Cloud Engine (ACE) .
  • Define policy rules to control access to GenAI and non-GenAI apps.
  • Enterprise DLP inspection for supported GenAI apps ONLY. Traffic with sensitive data from non-GenAI apps is *not* forwarded for inspection.
  • Access Strata Cloud Manager Command Center for GenAI visibility.
  • Access AI Access Security Activity Insights dashboard for detailed GenAI app usage data.
  • Tag GenAI apps on Strata Cloud Manager (includes Sanctioned/Tolerated tags in Panorama).
  • Generate reports for discovered GenAI apps ONLY .
  • View GenAI apps in the Application Dictionary.
  • View GenAI apps as third-party plugins in 7 SaaS marketplace apps.
  • Visibility and control of data-at-rest in ChatGPT Enterprise app .

AI Access Security and Enterprise DLP Licenses

When both AI Access Security and Enterprise DLP licenses are active (on NGFW/Prisma Access managed by Panorama or Strata Cloud Manager).

PCNSE/PCNSA Focus: Notice the difference here compared to "AI Access Security only" - Enterprise DLP inspection now applies to *both* GenAI and non-GenAI apps.

PAN-OS or Dataplane Version NGFW and Prisma Access (Managed by Panorama or Strata Cloud Manager)
11.2.2-h1 and later
Prisma Access 5.1 Innovation
  • Visibility into over 2,250 GenAI apps via dynamic content updates and ACE.
  • Define policy rules to control access to GenAI and non-GenAI apps.
  • Enterprise DLP inspection for supported GenAI and non-GenAI apps.
  • Access Strata Cloud Manager Command Center for GenAI visibility.
  • Access AI Access Security Activity Insights dashboard for detailed GenAI app usage data.
  • Tag GenAI apps on Strata Cloud Manager (includes Sanctioned/Tolerated tags in Panorama).
  • Generate reports for discovered GenAI apps ONLY.
  • View GenAI apps in the Application Dictionary.
  • View GenAI apps as third-party plugins in 7 SaaS marketplace apps.
  • Visibility and control of data-at-rest in ChatGPT Enterprise app.

CASB-PA and CASB-X Licenses

When CASB-PA or CASB-X licenses are active (on NGFW/Prisma Access managed by Strata Cloud Manager). Note: Functionality is the same across listed versions.

PCNSE/PCNSA Focus: Know that CASB-PA/X provides broader visibility and reporting capabilities across *all* SaaS Inline apps, not just GenAI apps, compared to having only the AI Access Security license.

PAN-OS or Dataplane Version CASB-PA and CASB-X
10.2, 11.1, 11.2.2-h1+
Prisma Access 5.0/5.1 (Preferred & Innovation depending on version)
  • Visibility into over 2,250 GenAI apps via dynamic content updates and ACE.
  • Define policy rules to control access to GenAI and non-GenAI apps.
  • Enterprise DLP inspection for supported GenAI and non-GenAI apps.
  • Access Strata Cloud Manager Command Center for GenAI visibility.
  • Access AI Access Security Activity Insights dashboard for detailed GenAI app usage data.
  • Tag GenAI apps on Strata Cloud Manager (includes Sanctioned/Tolerated tags in Panorama).
  • View the following for all SaaS Inline apps including GenAI apps : Dashboards, Users, Application Dictionary, Applications, Reports, Policy recommendations.
  • View all third-party plugins (SSPM) including GenAI plugins.
  • View asset details of all Sanctioned SaaS apps (data-at-rest) including GenAI apps.

Activate the AI Access Security License

PCNSE/PCNSA Focus: Understand the general activation process using the magic link via CSP. Know the role of CSP and Multitenancy (TSGs). Understand that activating CASB-PA/X includes AI Access Security automatically. Be aware of the prerequisites that must be met *before* activation (PAN-OS, management setup, E-DLP setup).

Gotcha: Activating AI Access Security requires a valid CSP account matching the email that received the magic link. Multitenancy adds steps for selecting the correct account and TSG.

Activate your AI Access Security license using a magic link from Palo Alto Networks after purchase.

AI Access Security is included automatically when you activate a CASB-PA or CASB-X license.

These procedures assume you have license auth codes and magic links, and that prerequisites are met (minimum PAN-OS, management setup, E-DLP setup).

New Deployments (Prerequisites)

Steps required before activating the AI Access Security license on a new deployment:

  1. Install and perform initial configuration for your NGFW , including activating support licenses.
  2. Set up management for your NGFW or Prisma Access tenant (Panorama or Strata Cloud Manager). This involves:
    • Setting up Panorama (M-Series or Virtual Appliance).
    • Deploying Strata Logging Service .
    • Registering Panorama and activating Panorama support/management licenses.
    • Adding managed firewalls to Panorama.
    • Upgrading Panorama and NGFW to minimum PAN-OS versions.
    • Installing Cloud Services plugin on Panorama (for Prisma Access).
    • Setting up Panorama Managed Prisma Access (for Prisma Access).
    • OR Activating AIOps for NGFW Premium license (for Strata Cloud Manager managed NGFW).
    • OR Activating Prisma Access license on Strata Cloud Manager (for Strata Cloud Manager managed Prisma Access).
    • Onboarding NGFW to Strata Cloud Manager (if applicable).
    • Installing latest dynamic content updates and upgrading NGFW to minimum PAN-OS (if SCM managed).
    • Setting up Prisma Access (if SCM managed).
  3. Set up Enterprise Data Loss Prevention (E-DLP) . This involves:
    • Installing the E-DLP plugin (Panorama) or Enabling E-DLP (SCM).
    • Editing E-DLP cloud content, data filtering, and snippet settings.
    • Reviewing supported advanced detection methods.
    • Creating data patterns and data profiles (recommend advanced profiles).
    • Modifying the DLP Rule (Strata Cloud Manager only).

Activation Steps (New or Existing Deployments)

Procedure after prerequisites are met:

  1. Click the magic link provided by Palo Alto Networks.
  2. Click Activate Subscription .
  3. Enter your Palo Alto Networks Customer Support Portal (CSP) Email Address . It must match the email that received the link.
    • If no valid CSP account exists for the email, you can Create a New Account . This new account gets a Multitenant Superuser role and is associated with the tenant.
  4. ( Multitenancy only ) Select the Customer Support Account.
  5. ( Multitenancy only ) Select the tenant service group (TSG) for activation (parent or child tenant). Activation is for the selected tenant *only*.
  6. Review the tenant Region (pre-populated and cannot be changed).
  7. In the Assign Licenses section, click Done . Verify AI Access Security License is Fully Assigned .
  8. Verify your Data Loss Prevention instance is selected if E-DLP is already active.
    • Gotcha: E-DLP is *not* required for AI Access Security activation itself. If E-DLP isn't active, one is created during activation. If you don't renew the AI Access Security license, E-DLP is no longer accessible and traffic isn't forwarded for inspection.
  9. Agree to the Terms and Conditions.
  10. Activate .

You are redirected to the Tenant Management page. The AI Access Security Activation Status starts Initializing . It displays as Data Security with a serial number starting with AIX . Proceed after status is Complete .

Tenant Management Activation Status Screenshot
  1. ( NGFW only ) Associate the AI Access Security license with your NGFW in Strata Cloud Manager (Settings > Device Associations > Associate Apps > Data Security > Select NGFW > Save). This is required for NGFW activation.
  2. Verify activation in CSP (Products > Assets > Select NGFW or Prisma Access tenant > Licenses & Subscriptions). Verify the AI Access Security license is active.
CSP Licenses & Subscriptions Screenshot
  1. Get Started with AI Access Security.
sequenceDiagram participant User participant PAN(CSP) as Palo Alto Networks (CSP) participant SCM as Strata Cloud Manager participant NGFW_PA as NGFW/Prisma Access participant E_DLP as Enterprise DLP Service User->>PAN(CSP): Purchases AI Access Security License PAN(CSP)-->>User: Sends Magic Activation Link User->>SCM: Clicks Magic Link (Browser) SCM->>User: Prompts for CSP Login User->>SCM: Enters CSP Email SCM->>PAN(CSP): Verifies User & License Entitlement alt Multitenancy SCM->>User: Prompts for Account & TSG Selection User->>SCM: Selects Account & TSG end SCM->>User: Shows License Assignment Details User->>SCM: Clicks "Activate Subscription" SCM->>SCM: Sets Activation Status (Initializing) SCM->>PAN(CSP): Confirms Activation & License Assignment PAN(CSP)-->>SCM: Updates Tenant Licenses alt E-DLP Not Active SCM->>E_DLP: Provision new E-DLP instance end SCM->>SCM: Sets Activation Status (Complete) alt NGFW Only User->>SCM: Navigates to Device Associations User->>SCM: Associates "Data Security" license with NGFW SCM->>NGFW_PA: Pushes License Association end User->>PAN(CSP): Logs into CSP to Verify PAN(CSP)-->>User: Displays Active Licenses (including AIX/Data Security) User->>SCM: Begins Configuration

Convert an AI Access Security Evaluation License to a Production License

PCNSE/PCNSA Focus: Understand the process for converting an EVAL license and the consequences of *not* converting it after the evaluation period (loss of E-DLP functionality/access).

Gotcha: Failure to convert means E-DLP stops working for *all* traffic, not just GenAI, even though the policy rules are preserved.

If you have the AI Access Security EVAL license active, you must convert it to production to continue safely controlling access and adopting GenAI apps after the evaluation period ends.

If you don't convert:

Procedure:

  1. Log in to Strata Cloud Manager .
  2. In the SCM menu (bottom-left), select Settings > Subscriptions .
  3. Strata Cloud Manager Subscriptions Menu
  4. Find the AI Access Security evaluation license and select Actions > Eval to Prod Request .
  5. Specify the production license terms:
    • License Quantity: Number of individuals using AI Access Security.
    • Term: Length of subscription.
    The request is reviewed by your Palo Alto Networks account representative to create a quote.
  6. Send Request .

Renew an AI Access Security License

PCNSE/PCNSA Focus: Know that AI Access Security licenses require manual renewal and the specific consequences if they expire (loss of E-DLP functionality/access).

Gotcha: Like EVAL licenses, expired production licenses result in E-DLP being inaccessible and traffic no longer being inspected for sensitive data, even if policy rules remain.

You must manually renew your expiring AI Access Security license to continue using it. It does not automatically renew .

If the AI Access Security license expires:

Procedure:

  1. Contact your Palo Alto Networks sales representative to request a renewal.
  2. Log in to Strata Cloud Manager .
  3. From the bottom-left menu, select Settings > Tenants .
  4. Strata Cloud Manager Tenants Menu
  5. Select the tenant for which you're renewing the license (parent or child). Tenants requiring immediate action are marked with a blue circle.
  6. Edit the tenant licenses.
  7. Agree to the terms and conditions and Activate Now (after the renewal is processed by PANW).

Perform Initial AI Access Security Configuration

PCNSE/PCNSA Focus: Understand the essential configuration steps needed after license activation to make AI Access Security functional. This includes E-DLP setup (patterns/profiles), enabling Role-Based Access, enabling the Best Practice snippet (policy rules), associating the Tagging snippet, creating a Vulnerability Protection profile, and creating zones (for NGFW).

An initial configuration is required after license activation.

Gotcha: Simply activating the license doesn't provide protection. You *must* perform these configuration steps, especially setting up E-DLP and enabling the policy snippets.

This procedure assumes the AI Access Security license is already activated .

Initial Configuration Steps:

  1. Set up and configure Enterprise Data Loss Prevention (E-DLP) .
    • E-DLP is the detection engine. You must associate a data profile with a Security policy rule.
    • Steps include: Installing/Enabling E-DLP (based on management), editing settings, reviewing advanced detection methods, creating data patterns and data profiles (advanced profiles recommended), and modifying the DLP Rule (Strata Cloud Manager only).
  2. Enable Role Based Access to define administrator access privileges (for AI Access Security, E-DLP, and the management interface).
  3. Enable the Gen-AI-Best-Practice Snippet .
    • Provides a starting point with preconfigured Security policy rules based on best practices.
    • Quickly allows Sanctioned apps and blocks many risky ones by default.
    • Associated with the Global folder by default but can be reassigned.
  4. Associate the Application-Tagging Snippet .
    • Required for tag-based policy rule enforcement .
    • Contains info on which apps are tagged Sanctioned or Tolerated (otherwise Unsanctioned).
    • Tags are read from this snippet for UI display and policy enforcement.
  5. Create a Vulnerability Protection profile .
    • Associated with Security policy rules to stop attempts to exploit system flaws.
  6. ( NGFW only ) Create an internal trust zone and an outbound untrusted zone.
    • Zones logically group interfaces. Policy rules use zones (source/destination) for traffic control.
  7. Create application filters to dynamically group GenAI apps for consistent policy application (predefined filters based on use case are included).
  8. Create Custom Security policy rules to refine control beyond the best-practice snippet.
flowchart TD A[License Activated] --> B(Set up Enterprise DLP) B --> C(Enable Role-Based Access) C --> D(Enable Gen-AI-Best-Practice Snippet) D --> E(Associate Application-Tagging Snippet) E --> F(Create Vuln Protection Profile) F --> G{NGFW Only?} G -- Yes --> H(Create Trust/Untrust Zones) G -- No --> I(Create Application Filters) H --> I I --> J(Create Custom Security Policies) J --> K(AI Access Security Configured)

Enable Role Based Access to AI Access Security

PCNSE/PCNSA Focus: Understand the predefined roles that grant access to AI Access Security and their general privilege levels (Full Read/Write, Read/Write, Read-Only). Know that custom roles are *not* supported specifically for AI Access Security access.

Gotcha: Custom roles *can* be configured in Panorama/SCM but they don't provide granular access *specific to the AI Access Security service itself*. You must use the predefined roles listed here.

Configure role-based access by assigning a predefined role to security administrators. These roles define read/write privileges for AI Access Security.

Roles and Permissions details other privileges.

Gotcha: Custom roles are not supported specifically for granting access privileges within the AI Access Security features/UI itself, although they are used for other Panorama/SCM functions.

Predefined AI Access Security Role Privileges
Data Security admin Full read and write access privileges for AI Access Security.
Multitenant Superuser Full read and write privileges for all available system-wide functions for all tenants in the particular multitenant hierarchy where the role is assigned.
Security Administrator Read and write access for AI Access Security.
Superuser Full read and write privileges for the tenant, including AI Access Security.
(Specific to a child tenant in multitenancy, not parent or other children).
View Only Administrator Read-only privileges for AI Access Security

Procedure (Managed by Panorama or Strata Cloud Manager):

  1. Configure a Panorama administrator account and admin role ( account and role ) (Panorama only) OR Onboard the NGFW to Strata Cloud Manager and configure Strata Cloud Manager user roles (Strata Cloud Manager only) . This step grants access to the management interface itself.
  2. Enable role-based access for Enterprise Data Loss Prevention (E-DLP) . This step defines privileges for configuring E-DLP patterns/profiles. Skip if already done or not needed for this user.
  3. Assign role-based access for AI Access Security in Common Services Identity and Access Access Management:
    1. Select User , enter the Identity Address (email).
    2. For Apps & Services , select AI Access Security .
    3. Select a predefined Common Services Role from the table above.
  4. Submit .

Enable the Gen-AI-Best-Practice Snippet

PCNSE/PCNSA Focus: Understand the purpose and initial state of the Gen-AI-Best-Practice snippet (disabled by default). Know the two policy rules included and their default actions and placement in the rulebase (Sanctioned = pre-rule, Default = post-rule). Understand how enabling this snippet quickly establishes basic GenAI policy control.

Gotcha: The snippet is disabled by default after license activation. You *must* manually enable the two policy rules within it for them to take effect.

Activating AI Access Security grants access to the predefined Gen-AI-Best-Practice snippet .

This snippet provides a starting point for Security policy rules using best practices for GenAI app adoption. It allows access to Sanctioned GenAI apps and blocks many potentially risky ones by default, enabling productivity while maintaining control.

It's associated with the default Global configuration folder by default but can be reassigned.

The snippet includes two key Security policy rules:

GenAI Policy Rules in SCM

Procedure to enable the rules:

  1. Log in to Strata Cloud Manager .
  2. Select Manage > Configuration > NGFW and Prisma Access > Security Services > Security Policy > Internet Security .
  3. Toggle the State column to enable (blue) for both the Sanctioned GenAI Access and Default GenAI App Access policy rules.
  4. ( Optional ) Create and apply Security Profiles (like a DLP rule ) to the Sanctioned GenAI Access policy rule to prevent sensitive data exfiltration for allowed apps. Use Recommendations to identify gaps.

Associate the Application-Tagging Snippet

PCNSE/PCNSA Focus: Understand the purpose of the Application-Tagging snippet (supports tag-based policy enforcement). Know that it must be associated with the correct scope(s) and that those scopes must have ACE enabled. Understand the importance of managing tags *only* within this snippet scope.

Gotcha: Tagging apps outside the Application-Tagging snippet scope or associating the snippet with scopes without ACE enabled can lead to inconsistent tags in the UI vs. what's enforced by policy, or configuration push failures.

The predefined Application-Tagging snippet in Strata Cloud Manager is required for tag-based policy rule enforcement .

It contains tagging information (Sanctioned, Tolerated, Unsanctioned) for GenAI apps. Tags are written to and read from this snippet for display in the UI (AI Access Security, Activity Insights, Command Center) and for policy evaluation.

Re-tagging apps (based on risk, etc.) updates this snippet. Pushing configuration applies these new tags to the NGFW/Prisma Access deployment, affecting tag-based rules.

To push tags, the snippet must be associated with the appropriate scope(s). Associate the snippet ONLY with NGFWs or Prisma Access deployments that have App-ID Cloud Engine (ACE) enabled .

Gotcha: The Application-Tagging snippet uses ACE App-IDs. If the NGFW/Prisma Access isn't configured to receive App-IDs from ACE, the configuration push will fail.

Procedure:

  1. Log in to Strata Cloud Manager .
  2. ( Important if you tagged apps before Sept 2024 update ) Remove existing Sanctioned and Tolerated app tags from all Configuration Scopes *other than* the Application-Tagging snippet scope .
    • Navigate to Manage > Configuration > NGFW and Prisma Access > Objects > Application > Applications .
    • Change Configuration Scope to where you previously managed tags.
    • Select tagged apps (use filters).
    • Remove Tag (removes admin-added tags, not predefined ones).
    • Repeat for all relevant scopes.

    Gotcha: Old tags outside the Application-Tagging snippet scope can still affect policy enforcement based on evaluation order, leading to unexpected behavior. Remove them to ensure the snippet's tags are authoritative.

  3. Select Manage > Configuration > NGFW and Prisma Access > Overview .
  4. Select Configuration Scope > Snippets > Application-Tagging .
  5. In the Snippet Associations area, click the settings gear icon.
  6. Select the scopes to associate with the Application-Tagging snippet. Ensure selected scopes have ACE enabled .

If you tag apps from the Applications page in Strata Cloud Manager ( Manage > Configuration > NGFW and Prisma Access > Objects > Application > Applications ), make sure the Configuration Scope is set to the Application-Tagging snippet .

Tagging to the Application-Tagging scope is important:

AI Access Security Quiz