Monitor Applications
You are here: Monitor > Security Services > Applications.
Use this page to view information about bandwidth consumption, session establishment, and risks associated with your applications.
To view the data on the Applications page, ensure that:
On-box traffic logging and reporting is enabled. If not, go to Device Administration > Basic Settings > Security Logging, enable Stream mode Logging and On-box Reporting.
Logging is enabled for a matching traffic firewall policy. If not, go to Security Policies & Objects > Security Policies and enable Logging options under Rule Options.
Application tracking is enabled for a security zone. If not, go to Security Policies & Objects > Zones/Screens and enable Application Tracking in the Add Zone page.
Table 1 describes the fields on the Applications page.
Table 1: Fields on the Applications Page
Field | Description |
---|---|
Top Users By Volume | Top users of the application; sorted by bandwidth consumption. |
Top Apps By Volume | Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by bandwidth consumption. |
Top Category By Volume | Top category, such as web, infrastructure, and so on of the application; sorted by bandwidth consumption. |
Top Characteristics By Volume | Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and so on of the application. |
Sessions By Risk | Number of events/sessions received; grouped by risk. |
View App Logs | Enables you to view the application logs. |
Search | Enables you to search a particular content from the data. |
Application Name | Name of the application, such as Amazon, Facebook, and so on. |
Risk Level | Risk associated with the application: critical, high, unsafe, moderate, low, and unknown. |
Users | Total number of users accessing the application. |
Volume | Bandwidth used by the application. |
Total Sessions | Total number of application sessions. |
Category | Category of the application, such as web, infrastructure, and so on. |
Sub-Category | Subcategory of the application. For example, social networking, news, and advertisements. Note: There can be many sub-categories for a single category. For example, if the Category is Multimedia, it can have sub-categories as Video-streaming and Audio-streaming and so on. |
Characteristics | Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling. Note: There can be many characteristics displayed by a comma separator. For example, characteristics can be displayed as Support File Transfer, Loss of Productivity, Bandwidth. |