In the ACC, review the most used applications and the high-risk
applications on your network. The ACC graphically summarizes the
log information to highlight the applications traversing the network,
who is using them (with
User-ID enabled),
and the potential security impact of the content to help you identify
what is happening on the network in real time. You can then use
this information to create appropriate security policy rules that
block unwanted applications, while allowing and enabling applications
in a secure manner.