End-of-Life (EoL)

Actions Supported on Applications

You can perform any of the following actions on this page:
Actions Supported for Applications
Filter by application
  • To search for a specific application, enter the application name or description in the
    field and press
    . The drop-down to the right of the search box allows you to search or filter for a specific application or view
    Custom applications
    Disabled applications
    , or
    Tagged applications
    The application is listed and the filter columns are updated to show statistics for the applications that matched the search. A search will match partial strings. When you define security policies, you can write rules that apply to all applications that match a saved filter. Such rules are dynamically updated when a new application is added through a content update that matches the filter.
  • To filter by application attributes displayed on the page; click an item that you want to use as a basis for filtering. For example, to restrict the list to the collaboration category, click
    and the list will only show applications in this category.
  • To filter on additional columns, select an entry in the other columns. The filtering is successive: first Category filters are applied, then Subcategory filters, then Technology filters, then Risk filters, and finally Characteristic filters. For example, if you apply a Category, Subcategory, and Risk filter, the Technology column is automatically restricted to the technologies that are consistent with the selected Category and Subcategory, even though a Technology filter has not been explicitly applied. Each time you apply a filter, the list of applications in the lower part of the page automatically updates. To create a new application filter, see Objects > Application Filters.
Add a new application.
To add a new application, see Defining Applications.
View and/or customize application details.
Click the application name link, to view the application description including the standard port and characteristics of the application, risk among other details. For details on the application settings, see Defining Applications.
If the icon to the left of the application name has a yellow pencil ( ), the application is a custom application.
Disable an applications
You can
an application (or several applications) so that the application signature is not matched against traffic. Security rules defined to block, allow, or enforce a matching application are not applied to the application traffic when the app is disabled. You might choose to disable an application that is included with a new content release version because policy enforcement for the application might change when the application is uniquely identified. For example, an application that is identified as web-browsing traffic is allowed by the firewall prior to a new content version installation; after installing the content update, the uniquely identified application no longer matches the Security rule that allows web-browsing traffic. In this case, you could choose to disable the application so that traffic matched to the application signature continues to be classified as web-browsing traffic and is allowed.
Enable an application
Select a disabled application and
the application so that it can be enforced according to your configured security policies.
Import an application
To import an application, click
. Browse to select the file, and select the target virtual system from the
Export an application
To export an application, select this option for the application and click
. Follow the prompts to save the file.
Assess policy impact after installing a new content release.
Review Policies
to assess the policy-based enforcement for applications before and after installing a content release version. Use the Policy Review dialog to review policy impact for new applications included in a downloaded content release version. The Policy Review dialog allows you to add or remove a pending application (an application that is downloaded with a content release version but is not installed on the firewall) to or from an existing Security policy rule; policy changes for pending applications do not take effect until the corresponding content release version is installed. You can also access the Policy Review dialog when downloading and installing content release versions on the
Dynamic Updates
Tag an application.
A predefined tag named
is available for you to tag SaaS applications. While a SaaS application is an application that is identified as
in the details on application characteristics, you can use the sanctioned tag on any application.
Select an application, click
Tag Application
, and, from the drop-down, select the predefined
tag to identify any application that you want to explicitly allow on your network. When you then generate the SaaS Application Usage Report (see Monitor > PDF Reports > SaaS Application Usage), you can compare statistics on the application that you have sanctioned versus unsanctioned SaaS applications that are being used on your network.
When you tag an application as sanctioned, the following restrictions apply:
  • The sanctioned tag cannot be applied to an application group.
  • The sanctioned tag cannot be applied at the
    level; you can tag an application only per device group or per virtual system.
  • The sanctioned tag cannot be used to tag applications included in a container app, such as facebook-mail, which is part of the facebook container app.
You can also
Remove tag
Override tag
. The override option is only available on a firewall that has inherited settings from a device group pushed from Panorama.

Recommended For You