Convert legacy port-based security policy rules that
have seen no new applications for a period of time to application-based
rules.
Convert port-based rules that have not seen
new applications for a reasonable period of time, which means the
rules have stabilized and you’re less likely to see new applications
on them. Clone these rules to ensure that if more applications match
the rule later, the port-based rule remains in the rulebase as long
as necessary as a safety net.
Take applications used
only for quarterly, annual, and other periodic events into account
when you evaluate whether you think new applications will match
the rule.