Convert legacy port-based security policy rules that
have seen the fewest applications to application-based rules.
Rules with relatively few Apps
Seen and with no new applications seen over a long enough
time period may be easy to convert, relatively stable, and easy
to identify using filters.