Aplication Signatures Overview
Use the Application Signatures page to view application signatures that are already downloaded and to create, modify, clone, and delete application signatures and signature groups. The Application Signatures page displays the name, object type, category and subcategory, risk associated with, and characteristics of the signature. You can create custom application and application group with a set of similar signatures for consistent reuse when defining policies.
To access this page, select Shared Services > Objects > Applications.
Field Descriptions
Field |
Description |
---|---|
Name |
Enter a unique name for the application signature or application signature group. The name must begin with an alphanumeric character and can contain alphanumeric characters and some special characters (colons, hyphens, forward slashes, periods, and underscores); 63-character maximum. |
Type |
Signature application or group —either application signature or application signature group. |
Category |
Category of the application signature. For example, the value of Category can be Messaging, Web, Infrastructure, Remote-Access, Multimedia, and so on |
Sub Category |
Subcategory of the application signature. For example, the value of Subcategory can be Wiki, File-Sharing, Multimedia, Social-Networking, News, and so on. |
Risk |
Level of risk associated with the application signature. For example, the value of Risk can be Low, Moderate, Unsafe, High, and Critical. |
Characteristics |
One or more characteristics of the application signature. |
Predefined/Custom |
Indicates whether an application signature or signature groups is predefined or custom. |
Cacheable |
If an application is created with the Cacheable option, the column displays True, otherwise displays --. |
Created Version |
Version of the application signature. |
Order |
Order of the application signature. |