Applications and Usage
- Policies > Security > Policy Optimizer > No App Specified > Compare (or click the number inApps Seen)
- Policies > Security > Policy Optimizer > Unused Apps > Compare (or click the number inApps Seen)
- Policies > Security and click the number inApps Seen
On the Usage tab of the Security policy rule, you can also
Compare Applications & Applications Seento access tools that help you to migrate from port-based Security policy rules to application-based Security policy rules and to eliminate unused applications from rules in
Applications & Usage.
The time period for the application information:
Apps on Rule
The applications configured on the rule or
Anyif no specific applications are configured on the rule. You can
Deleteapplications as needed, and applications are configured on a rule, the circled number next to Apps on Rule indicates how many. Adding applications from this location is the same as adding applications on the Security policy rule
All applications seen and allowed on the firewall that matched the rule. The circled number next to Apps Seen indicates how many applications were seen on the rule.
Apps Seen Actions
Actions you can perform on
Add to This Rule dialog
Add Apps to Existing Rule dialog
When you select applications from
Create Cloned Ruleor
Add to Rulethat have related applications, these dialogs list:
Add to Rule, and
Add Apps to Existing Ruledialogs help to ensure that applications don’t break and enable you to future-proof the rule by including relevant individual applications that are related to the applications you’re cloning or adding to a rule.
Recommended For You
Recommended videos not found.