You now have a simple way to gain visibility
into, control usage of, and safely enable applications in Security
policy rules:
Policy Optimizer. This
new feature identifies port-based rules so you can convert them
to application-based whitelist rules or add applications to existing
rules without compromising application availability. It also identifies
rules configured with unused applications.
Policy Optimizer
information
helps you analyze rule characteristics and prioritize which rules
to migrate or clean up first.