With application filter policies, you can control access to applications for users behind the firewall.
Policies specify access to application categories or individual applications using rules. The default set of policies includes some commonly used restrictions. You can also create custom policies according to the requirements of your organization.
In application filter policies, the web proxy detects applications that use HTTPS.
- To add an application filter policy, click Add. When you add a policy, you can select any policy as a template. Then, after you save the policy, you can add or edit rules.
- To edit a policy, find the policy you want to change and click Edit .
|Permits traffic from all applications.
|Drops traffic from all applications.
|Block filter avoidance apps
|Drops traffic from applications that tunnel other applications, proxy and tunnel applications, and from applications that can bypass firewall policies.
|Block generally unwanted apps
|Drops traffic from file transfer, proxy and tunnel, risk-prone, peer-to-peer networking (P2P), and other applications that cause loss of productivity.
|Block high risk (Risk Level 4 and 5) apps
|Drops traffic from high-risk applications.
|Block peer to peer (P2P) networking apps
|Drops traffic from P2P applications. You can use these applications to distribute bots, spyware, adware, trojans, rootkits, worms, and other types of malware. We recommend that you block P2P applications in your network.
|Block very high risk (Risk Level 5) apps
|Drops traffic from very high-risk applications.