Application filter

With application filter policies, you can control access to applications for users behind the firewall.

Policies specify access to application categories or individual applications using rules. The default set of policies includes some commonly used restrictions. You can also create custom policies according to the requirements of your organization.

In application filter policies, the web proxy detects applications that use HTTPS.

  • To add an application filter policy, click Add. When you add a policy, you can select any policy as a template. Then, after you save the policy, you can add or edit rules.
  • To edit a policy, find the policy you want to change and click Edit Edit button.
Table 1. Default application filter policies

Name

Description

Allow All

Permits traffic from all applications.

Deny All

Drops traffic from all applications.

Block filter avoidance apps

Drops traffic from applications that tunnel other applications, proxy and tunnel applications, and from applications that can bypass firewall policies.

Block generally unwanted apps

Drops traffic from file transfer, proxy and tunnel, risk prone, peer-to-peer networking (P2P), and other applications that cause loss of productivity.

Block high risk (Risk Level 4 and 5) apps

Drops traffic from high risk applications.

Block peer to peer (P2P) networking apps

Drops traffic from P2P applications. These applications can be used to distribute bots, spyware, adware, trojans, rootkits, worms, and other types of malware. It is recommended that you block P2P applications in your network.

Block very high risk (Risk Level 5) apps

Drops traffic from very high risk applications.