ON THIS PAGE
About the Application Signatures Page
Use this page to view application signatures and application signature groups that are already downloaded and to create, modify, clone, and delete custom application signatures and custom application signature groups. This page displays the name, object type, category and subcategory, risk associated with, and characteristics of the signature. You can create custom application signatures and custom application signature groups with a set of similar signatures for consistent reuse when defining policies.
Tasks You Can Perform
You can perform the following tasks from this page:
Create an application signature. See Adding Application Signatures.
Modify, clone, or delete an application signature. See Editing, Cloning, and Deleting Application Signatures.
Create an application signature group. See Creating Application Signature Groups.
Modify, clone, or delete an application signature group. See Editing, Cloning, and Deleting Application Signature Groups.
View the configured parameters of an application signature or application signature group— Hover over the application signature or group name and click the Detailed View icon or click More > Detailed View.
The Detailed View page appears, displaying the same values that you specified for each parameter in the selected application or application signature group.
Show or hide columns displayed on the page—Click the Show Hide columns icon in the top right corner of the table and select the columns that you want to view on the page.
Search for a specific application signature or application signature group—Click the Search icon in the top right corner of the table and enter the search text in the text box, and press Enter. The search results are displayed on the same page.
Filter the application signature information based on the selected criteria—Select the filter icon at the top right corner of the table to apply a filter. For example, you can filter information based on the object type (application signature or application signature group) or risk level (Low, Moderate, and so on).
Click Clear All to remove the applied filter.
Field Descriptions
Table 1 describes the fields on the Application Signatures page.
Field |
Description |
---|---|
Name |
Name of the application signature or application signature group. |
Object Type |
Signature type—either application signature or application signature group. |
Category |
UTM category of the application signature. For example, the value of Category can be Messaging, Web, Infrastructure, Remote-Access, Multimedia, and so on. |
Subcategory |
UTM subcategory of the application signature. For example, the value of Subcategory can be Wiki, File-Sharing, Multimedia, Social-Networking, News, and so on. |
Risk |
Level of risk associated with the application signature. For example, the value of Risk can be low, moderate, high, critical, unsafe, and so on. |
Characteristic |
One or more characteristics of the application signature. For example, supports file transfer, loss of productivity, and so on. |
Predefined or Custom |
A list of predefined application signatures and application signature groups, and a list of custom application and custom application signature groups that you created. |
Cacheable |
Indicates whether the information related to an application signature is cacheable (True) or non-cacheable (False). |