Create a Custom Application with
a signature and attach it to a security policy, or create a custom
application and define an application override policy—A custom application
allows you to customize the definition of the internal application—its
characteristics, category and sub-category, risk, port, timeout—and
exercise granular policy control in order to minimize the range
of unidentified traffic on your network. Creating a custom application
also allows you to correctly identify the application in the
ACC
and
traffic logs and is useful in auditing/reporting on the applications
on your network. For a custom application you can specify a signature
and a pattern that uniquely identifies the application and attach
it to a security policy that allows or denies the application.