Actions Supported on Applications
You can perform any of the following actions on this page:
Actions Supported for Applications
Filter by application
Add a new application.
View and/or customize application details.
Click the application name link, to view the application description including the standard port and characteristics of the application, risk among other details. For details on the application settings, see Defining Applications.
If the icon to the left of the application name has a yellow pencil ( ), the application is a custom application.
Disable an applications
Disablean application (or several applications) so that the application signature is not matched against traffic. Security rules defined to block, allow, or enforce a matching application are not applied to the application traffic when the app is disabled. You might choose to disable an application that is included with a new content release version because policy enforcement for the application might change when the application is uniquely identified. For example, an application that is identified as web-browsing traffic is allowed by the firewall prior to a new content version installation; after installing the content update, the uniquely identified application no longer matches the Security rule that allows web-browsing traffic. In this case, you could choose to disable the application so that traffic matched to the application signature continues to be classified as web-browsing traffic and is allowed.
Enable an application
Select a disabled application and
Enablethe application so that it can be enforced according to your configured security policies.
Import an application
To import an application, click
Import. Browse to select the file, and select the target virtual system from the
Export an application
To export an application, select this option for the application and click
Export. Follow the prompts to save the file.
Assess policy impact after installing a new content release.
Review Policiesto assess the policy-based enforcement for applications before and after installing a content release version. Use the Policy Review dialog to review policy impact for new applications included in a downloaded content release version. The Policy Review dialog allows you to add or remove a pending application (an application that is downloaded with a content release version but is not installed on the firewall) to or from an existing Security policy rule; policy changes for pending applications do not take effect until the corresponding content release version is installed. You can also access the Policy Review dialog when downloading and installing content release versions on the
Tag an application.
A predefined tag named
sanctionedis available for you to tag SaaS applications. While a SaaS application is an application that is identified as
Saas=yesin the details on application characteristics, you can use the sanctioned tag on any application.
Select an application, click
Tag Application, and, from the drop-down, select the predefined
Sanctionedtag to identify any application that you want to explicitly allow on your network. When you then generate the SaaS Application Usage Report (see Monitor > PDF Reports > SaaS Application Usage), you can compare statistics on the application that you have sanctioned versus unsanctioned SaaS applications that are being used on your network.
When you tag an application as sanctioned, the following restrictions apply:
You can also
Override tag. The override option is only available on a firewall that has inherited settings from a device group pushed from Panorama.
Generate the SaaS Application Usage Report
Generate the SaaS Application Usage Report The SaaS Application Usage PDF report is a two-part report that is based on the notion of sanctioned and ...
Maintain the Rulebase
Maintain the Rulebase Because applications are always evolving, your application whitelist will need to evolve also. Each time you make a change in what applications ...
Applications Overview The Applications page lists various attributes of each application definition, such as the application’s relative security risk (1 to 5). The risk value ...
Objects > Tags
Objects > Tags Tags allow you to group objects using keywords or phrases. Tags can be applied to address objects, address groups (static and dynamic), ...
SaaS Visibility Enhancements in the ACC
SaaS Visibility Enhancements in the ACC ACC Enhancements for SaaS Application Visibility —The ACC has a new global filter to assess application activity on your ...
Maintain the Data Center Best Practice Rulebase
As conditions in your data center change, update the Security policy rulebase accordingly. Modify rules to control new and modified applications, protect new servers and ...
Disable or Enable App-IDs
Disable or Enable App-IDs Disable new App-IDs included in a content release to immediately benefit from protection against the latest threats while continuing to have ...
Monitor > PDF Reports > SaaS Application Usage
Monitor > PDF Reports > SaaS Application Usage Use this page to create a report that summarizes the SaaS application activity on your network. This ...
Application Whitelist Example
Application Whitelist Example Keep in mind that you do not need to capture every application that might be in use on your network in your ...