End-of-Life (EoL)
Applications and Usage
- Policies > Security > Policy Optimizer > No App Specified > Compare (or click the number inApps Seen)
- Policies > Security > Policy Optimizer > Unused Apps > Compare (or click the number inApps Seen)
- Policies > Security and click the number inApps Seen
On the Usage tab of the Security policy rule,
you can also
Compare Applications & Applications
Seen
to access tools that help you to migrate from port-based Security
policy rules to application-based Security policy rules and to eliminate
unused applications from rules in Applications &
Usage
. Field | Description |
---|---|
Timeframe | The time period for the application information:
|
Apps on Rule | The applications configured
on the rule or Any if no specific applications
are configured on the rule. You can Browse , Add ,
and Delete applications as needed, and applications
are configured on a rule, the circled number next to Apps on Rule
indicates how many. Adding applications from this location is the
same as adding applications on the Security policy rule Application tab. |
Apps Seen | All applications seen and allowed
on the firewall that matched the rule. The circled number next to
Apps Seen indicates how many applications were seen on the rule.
|
Apps Seen Actions | Actions you can perform on Apps Seen :
|
Clone dialog Add to This Rule dialog Add
Apps to Existing Rule dialog | When you select applications from Apps Seen and Create
Cloned Rule or Add to Rule that
have related applications, these dialogs list:
The Clone , Add to
Rule , and Add Apps to Existing Rule dialogs
help to ensure that applications don’t break and enable you to future-proof
the rule by including relevant individual applications that are
related to the applications you’re cloning or adding to a rule. |
Recommended For You
Recommended Videos
Recommended videos not found.