- play_arrow Juniper Web Device Manager
- play_arrow Getting Started
-
- play_arrow Add SRX Series Firewall to Security Director Cloud
- play_arrow Dashboard
- play_arrow J-Web Dashboard
-
- play_arrow Monitor
- play_arrow Network
- play_arrow Logs
- play_arrow Maps and Charts
- play_arrow Statistics
- play_arrow Reports
-
- play_arrow Device Administration
- play_arrow Basic Settings
- play_arrow Cluster Management
- play_arrow User & Roles
- play_arrow Multi Tenancy—Resource Profiles
- play_arrow Multi Tenancy—Interconnect Ports
- play_arrow Multi Tenancy—Logical Systems
- play_arrow Multi Tenancy—Tenants
- play_arrow Certificate Management—Device Certificates
- play_arrow Certificate Management—Trusted Certificate Authority
- About the Trusted Certificate Authority Page
- Generate Default Trusted Certificate Authorities
- Enroll a CA Certificate
- Import a CA Certificate
- Add a Certificate Authority Profile
- Edit a Certificate Authority Profile
- Delete a Certificate Authority Profile
- Search Text in the Trusted Certificate Authority Table
- play_arrow Certificate Management—Certificate Authority Group
- play_arrow License Management
- play_arrow Security Package Management
- play_arrow ATP Management
- play_arrow Operations
- play_arrow Software Management
- play_arrow Configuration Management
- play_arrow Alarm Management
- play_arrow RPM
- play_arrow Tools
- play_arrow Reset Configuration
-
- play_arrow Network
- play_arrow Connectivity—Interfaces
- play_arrow Connectivity—VLAN
- play_arrow Connectivity—Link Aggregation
- play_arrow Connectivity—Wireless LAN
- play_arrow DHCP Client
- play_arrow DHCP Server
- play_arrow Firewall Filters—IPv4
- play_arrow Firewall Filters—IPv6
- play_arrow Firewall Filters—Assign to Interfaces
- play_arrow NAT Policies
- play_arrow NAT Pools
- play_arrow Destination NAT
- play_arrow Static NAT
- play_arrow NAT Proxy ARP/ND
- play_arrow Static Routing
- play_arrow RIP Routing
- play_arrow OSPF Routing
- play_arrow BGP Routing
- play_arrow Routing Instances
- play_arrow Routing—Policies
- play_arrow Routing—Forwarding Mode
- play_arrow CoS—Value Aliases
- play_arrow CoS—Forwarding Classes
- play_arrow CoS Classifiers
- play_arrow CoS—Rewrite Rules
- play_arrow CoS—Schedulers
- play_arrow CoS—Scheduler Maps
- play_arrow CoS—Drop Profile
- play_arrow CoS—Virtual Channel Groups
- play_arrow CoS—Assign To Interface
- play_arrow Application QoS
- play_arrow IPsec VPN
- play_arrow Manual Key VPN
- play_arrow Dynamic VPN
-
- play_arrow Security Services
- play_arrow Content Security Default Configuration
- play_arrow Content Security Antivirus Profiles
- play_arrow Content Security Web Filtering Profiles
- play_arrow Content Security Antispam Profiles
- play_arrow Content Security Content Filtering Profiles
- play_arrow Content Security Custom Objects
- play_arrow Content Security Policies
- play_arrow IPS Policies
- play_arrow IPS Signatures
- play_arrow IPS Sensor
- play_arrow ALG
- play_arrow Metadata Streaming Profile
- play_arrow ATP Anti-malware
- play_arrow ATP SecIntel Profiles
- About the SecIntel Profiles Page
- Configure DNS Sinkhole
- Create a Command and Control Profile
- Edit a Command and Control Profile
- Delete a Command and Control Profile
- Create a DNS Profile
- Edit a DNS Profile
- Delete a DNS Profile
- Create an Infected Hosts Profile
- Edit an Infected Hosts Profile
- Delete an Infected Hosts Profile
- play_arrow ATP SecIntel Profile Groups
- play_arrow SSL Initiation Profiles
- play_arrow SSL Proxy Profiles
- play_arrow Firewall Authentication—Access Profile
- play_arrow Firewall Authentication—Address Pools
- play_arrow Firewall Authentication Settings
- play_arrow Firewall Authentication—UAC Settings
- play_arrow Firewall Authentication—Active Directory
- play_arrow Firewall Authentication—Local Authentication
- play_arrow Firewall Authentication—Authentication Priority
- play_arrow Firewall Authentication—JIMS
- play_arrow ICAP Redirect
-
ON THIS PAGE
About the Dynamic Applications Page
You are here: Security Policies & Objects > Dynamic Applications.
Use this page to create, modify, clone, and delete application signature groups. You can view the details of predefined application signatures that are already downloaded.
All enabled and disabled application signatures on the device
are displayed in a grid format. A message Once a new
custom application signature is created or modified, the configuration
is committed immediately to the device.
is displayed
at the top of the page.
A status message is displayed just above the grid. It shows the version number of the installed application, the latest version available, and whether you have downloaded or installed an application package.
Installed application package version : 0 | Latest version 3207 available | No application package is downloaded yet
If you successfully download an application package, the Install button is displayed. If you successfully install a downloaded application package, an Uninstall button is displayed.
Tasks You Can Perform
You can perform the following tasks from this page:
Global Settings. See Global Settings.
Create application signatures. See Add Application Signatures.
Create application signatures group. See Add Application Signatures Group.
Edit application signatures. See Edit Application Signatures.
Delete application signatures. See Delete Application Signatures.
Clone application signatures. See Clone Application Signatures.
Search text in an application signature. See Search Text in an Application Signatures Table.
View the details of application signatures—To do this, select the application signature for which you want to view the details and follow the available options:
Click More and select Detailed View.
Right-click on the selected application signature profile and select Detailed View.
Mouse over to the left of the selected application signature and click Detailed View.
Filter the application signatures based on select criteria. To do this, select the filter icon at the upper-right corner of the application signatures table. The columns in the grid change to accept filter options. Type the filter options; the table displays only the data that fits the filtering criteria.
Show or hide columns in the application signature profiles table. To do this, click the Show Hide Columns icon in the upper-right corner of the application signatures table and select the options you want to view or deselect the options you want to hide on the page.
More—Clone an existing application signature package, create group, or configure the page to show a detailed view.
Create Group—Create a new application signature or application signatures group.
Field Descriptions
Table 1 describes the fields on the Application Signatures page.
Field | Description |
---|---|
Name | Displays the application signature name. |
Object Type | Displays the application signature object type. |
Category | Specifies the category of the application signature. |
Subcategory | Specifies the subcategory of the application signature. |
Risk | Displays the risk as critical, high, moderate, low, or unsafe. |
Characteristic | Specifies the characteristic of the application signature. |
Predefined or Custom | Displays the predefined or custom application signatures and settings that are configured on your device. |
Status | Displays the status of the application signature. |