You now have a simple way to gain visibility
into, control usage of, and safely enable applications in Security
policy rules:
Policy Optimizer. This
new feature identifies port-based rules so you can convert them
to application-based rules that allow the traffic or add applications
to existing rules without compromising application availability.
It also identifies rules configured with unused applications.
Policy
Optimizer
information helps you analyze rule characteristics
and prioritize which rules to migrate or clean up first.