Device Configuration : Protect : Applications : Application Filter
Application Filter
The Application Filter page displays list of all the predefined and custom policies.
An Application Filter Policy controls user’s application access. It specifies which user has access to which applications and allows defining powerful security policies based on a number of parameters like:
Individual users
Groups of users
Time of day
The device is shipped with the following predefined application filter policies:
Allow All: By default, allows access to all the categories except the specified categories. Access to the specified categories depends on the strategy defined for each category.
Deny All: By default, denies access to all the categories except the specified categories. Access to the specified categories depends on the strategy defined for each category.
Block generally unwanted apps: Drops generally unwanted application traffic. This includes applications such as file transfer, proxy & tunnel, risk prone, peer to peer networking (P2P) and applications that cause loss of productivity.
Block filter avoidance apps: Drops traffic from applications that tunnel other applications, proxy and tunnel applications, and from applications that can bypass firewall policy. These applications allow users to anonymously browse the Internet by connecting to servers on the Internet via encrypted SSL tunnels. This, in turn, enables users to bypass network security measures.
Block peer to peer (P2P) networking apps: Drops traffic from applications that are categorized as P2P applications. P2P could be a mechanism for distributing Bots, Spywares, Adware, Trojans, Rootkits, Worms and other types of malwares. It is generally advised to have P2P applications blocked in your network.
Block very high risk (Risk Level 5) apps: Drops traffic from applications that are classified under 'very high risk' applications (Risk Level - 5).
Block high risk (Risk Level 4 and 5) apps: Drops traffic from applications that are classified under 'high risk' applications (Risk Level - 4 and 5).
These predefined policies are immediately available for use until configured otherwise. You can also define custom policies to define different levels of access for different users to meet your organization’s requirements.
The page also provides option to add a new policy, update parameters of the exisiting policy, delete a policy, add a filtering rule to a policy or delete a filtering rule attached to a policy.