You are here: Monitor > Security Services > Applications.
Use this page to view information about bandwidth consumption, session establishment, and risks associated with your applications.
To view the data on the Applications page, ensure that:
Logging is enabled. If not, go to Configure > Device Settings > Basic Settings > Security Logging and enable Logging.
Logging is enabled for a matching traffic firewall policy. If not, go to Configure > Device Settings > Security Services > Security Policy > Rules and enable Log Options under Rule Options.
Application tracking is enabled for a security zone. If not, go to Configure > Security Services > Security Policy > Objects > Zones/Screens and enable Application Tracking.
Table 1 describes the fields on the Applications page.
Table 1: Fields on the Applications Page
Top Users By Volume
Top users of the application; sorted by bandwidth consumption.
Top Apps By Volume
Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by bandwidth consumption.
Top Category By Volume
Top category, such as web, infrastructure, and so on of the application; sorted by bandwidth consumption.
Top Characteristics By Volume
Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and so on of the application.
Sessions By Risk
Number of events/sessions received; grouped by risk.
View App Logs
Enables you to view the application logs.
Enables you to search a particular content from the data.
Name of the application, such as Amazon, Facebook, and so on.
Risk associated with the application: critical, high, unsafe, moderate, low, and unknown.
Total number of users accessing the application.
Bandwidth used by the application.
Total number of application sessions.
Category of the application, such as web, infrastructure, and so on.
Subcategory of the application. For example, social networking, news, and advertisements.
Note: There can be many sub-categories for a single category. For example, if the Category is Multimedia, it can have sub-categories as Video-streaming and Audio-streaming and so on.
Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling.
Note: There can be many characteristics displayed by a comma separator. For example, characteristics can be displayed as Support File Transfer, Loss of Productivity, Bandwidth.