Application control restricted administrator
Application control sensors specify what action to take with network traffic generated by a large number of applications.
Custom signatures for application control
To create a custom signature for Application Control:
- Log on as a Restricted Administrator.
- Go to Application Control > Custom Signatures.
- Click Create New. The Create New Custom Application Signature screen appears.
- Specify the values for the following and click OK.
- Name - specify a name for the custom signature.
- Signature - add a custom signature.
- Comment - toggle the status to ON.
Application control profiles
To create a profile:
- Log in as a Restricted Administrator.
- In the tree menu, select Application Control, and then select a profile category.
- In the toolbar, click Create New.
- Configure the profile settings, and click OK.
To clone an existing profile, right-click the profile in the content pane, and select Clone. |
To edit a profile:
- Log in as a Restricted Administrator.
- In the tree menu, select Application Control, and then select a profile category.
- In the content pane select a profile, and take one of the following actions:
- In the toolbar, click Edit.
- Right-click the profile, and select Edit.
- Edit the settings, and click OK.
Name
The profile name.
Comment
Optionally, enter a description of the profile.
Categories
Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.
Application Overrides
Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.
Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).
Filter Overrides
Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.
Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).
Deep Inspection of Cloud Applications
Select to enable deep inspections of cloud applications.
Allow and Log DNS Traffic
Select to allow and log DNS traffic.
Replacement Messages for HTTP-based Applications
Select to enable replacement messages for HTTP based applications.
Logging of Other Applications
Select to enable the logging of other applications.
Logging of Unknown Applications
Select to enable the logging of unknown applications.
Advanced Options
Configure advanced options:
- p2p-block-list: Select from bittorent, edonkey, and skype.
- replacemsg-group: Select an option from the dropdown list.
To view where a profile is being used:
- Log in as a restricted administrator.
- In the tree menu, select Profiles.
- In the content pane, select a profile from the list, and click Where Used in the More dropdown menu.
The dialog window displays the ADOM and policy package/block where the package is currently being used. - (Optional) Select a policy in the list, and click View to display the policy details.