You are here: Monitor > Security Services > Applications.
Use this page to view information about bandwidth consumption, session establishment, and risks associated with your applications.
To view the data on the Applications page, ensure that:
On-box traffic logging and reporting is enabled. If not, go to Device Administration > Basic Settings > Security Logging, enable Stream mode Logging and On-box Reporting.
Logging is enabled for a matching traffic firewall policy. If not, go to Security Policies & Objects > Security Policies and enable Logging options under Rule Options.
Application tracking is enabled for a security zone. If not, go to Security Policies & Objects > Zones/Screens and enable Application Tracking in the Add Zone page.
Table 1 describes the fields on the Applications page.
Table 1: Fields on the Applications Page
Top Users By Volume
Top users of the application; sorted by bandwidth consumption.
Top Apps By Volume
Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by bandwidth consumption.
Top Category By Volume
Top category, such as web, infrastructure, and so on of the application; sorted by bandwidth consumption.
Top Characteristics By Volume
Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and so on of the application.
Sessions By Risk
Number of events/sessions received; grouped by risk.
View App Logs
Enables you to view the application logs.
Enables you to search a particular content from the data.
Name of the application, such as Amazon, Facebook, and so on.
Risk associated with the application: critical, high, unsafe, moderate, low, and unknown.
Total number of users accessing the application.
Bandwidth used by the application.
Total number of application sessions.
Category of the application, such as web, infrastructure, and so on.
Subcategory of the application. For example, social networking, news, and advertisements.
Note: There can be many sub-categories for a single category. For example, if the Category is Multimedia, it can have sub-categories as Video-streaming and Audio-streaming and so on.
Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling.
Note: There can be many characteristics displayed by a comma separator. For example, characteristics can be displayed as Support File Transfer, Loss of Productivity, Bandwidth.