Create port-based security policy. | Malicious applications access the network by
spoofing port numbers, tunneling through a port, or using port hopping
to avoid detection. | Application whitelist rules prevent applications
from running on non-standard ports. Log and monitor whitelist violations.
When you transition from port-based to application-based
rules, in the rulebase, place the application-based rule above the port-based
rule it will replace. Reset the policy rule hit counter for both rules.
If traffic hits the port-based rule, its policy rule hit count increases.
Tune the application-based rule until no traffic hits the port-based
rule for a period of time, then remove the port-based rule.
|