Fortinet white logo
Fortinet white logo

Administration Guide

Applications

Applications

The APPLICATIONS page lists all communicating applications detected in your organization that have ever attempted to communicate. By default, applications are sorted according to their first-seen indicator, placing new applications at the top. To access this page, click the down arrow next to COMMUNICATION CONTROL and then select Applications.

Information is organized hierarchically in a two-level tree. The first (top) level specifies the name of the application. The second level specifies the application version. For example, the figure below shows ten versions for the Firefox application.

The following information displays for each application in the application list:

  • Selection checkbox
  • Resolving status icon
  • Signed/Unsigned indication
  • APPLICATION/VERSION: The name of the application/version.
  • VENDOR: The application’s vendor and certificate details.
  • REPUTATION: The reputation score of the application. For more details, Reputation score
  • VULNERABILITY: The highest CVE vulnerability score for the application. For more details, see Vulnerability
  • FIRST SEEN: The date and time when the application was first seen in the organization.
  • LAST SEEN: The date and time of the last connection of this application.

The APPLICATION DETAILS area of the window on the right displays policy-related details for the entity (application or version) selected in the application list. This area displays the policy action (Allow or Deny) for each communication control policy.

The Advanced Data area at the bottom of the window presents statistics about the selected application/version in the application list. For more details, see Advanced Data.

Applications

Applications

The APPLICATIONS page lists all communicating applications detected in your organization that have ever attempted to communicate. By default, applications are sorted according to their first-seen indicator, placing new applications at the top. To access this page, click the down arrow next to COMMUNICATION CONTROL and then select Applications.

Information is organized hierarchically in a two-level tree. The first (top) level specifies the name of the application. The second level specifies the application version. For example, the figure below shows ten versions for the Firefox application.

The following information displays for each application in the application list:

  • Selection checkbox
  • Resolving status icon
  • Signed/Unsigned indication
  • APPLICATION/VERSION: The name of the application/version.
  • VENDOR: The application’s vendor and certificate details.
  • REPUTATION: The reputation score of the application. For more details, Reputation score
  • VULNERABILITY: The highest CVE vulnerability score for the application. For more details, see Vulnerability
  • FIRST SEEN: The date and time when the application was first seen in the organization.
  • LAST SEEN: The date and time of the last connection of this application.

The APPLICATION DETAILS area of the window on the right displays policy-related details for the entity (application or version) selected in the application list. This area displays the policy action (Allow or Deny) for each communication control policy.

The Advanced Data area at the bottom of the window presents statistics about the selected application/version in the application list. For more details, see Advanced Data.