In this video, you will use application control to track applications on your network and enhance security by restricting certain applications.
The 40 Gait database categorizes applications by category, technology, popularity and risk.
In this example, you will block bit torrent ah, high risk file sharing application that is part of the peer to peer category.
You will also block access to the most popular application YouTube.
First, ensure that the required security features are enabled. Go to system
enable application control,
and naval multiple security profiles
and applied the changes. Next, go to Security Profile's application Control and edit the default profile.
A list of application categories. Air shown
by default. The Fort Gate monitors most applications,
select all other known applications and said it to monitor. Also said all other unknown applications to monitor
enabled deep inspection of cloud applications to allow Web based applications such as video streaming to be monitored by your four to gate,
go to policy and objects policy. I pee before to enable application control with the default profile you just modified.
Edit the policy that allows connections from the internal network to the Internet under security Profile's enable application control and use the default profile.
Enabling application control automatically enables SSL inspection
set SSL inspection too deep inspection. This may cause certificate mornings
and log all sessions.
and select 24 hour to see the traffic. Your forte Gators processing
the list is organized by application.
Double click on an entry. To learn more about a specific application,
you can see traffic sources,
destinations, threats and individual sessions.
four to view cloud applications and select 24 hour to see cloud application traffic with cloud applications. You can also see which videos have been viewed
to block the bit. Torrent and YouTube traffic shown in the fort of you dashboard go to Security Profile's application control
bit Torrent is a peer to peer file sharing application.
So set the peer to peer category to block
now at an application override signature to block YouTube,
search for YouTube and select all the signatures that are shown.
Then click you selected signatures.
The signatures are added to the application overrides list where they are automatically blocked,
enabled deep inspection of cloud applications
go to policy and objects policy. I pee before toe. Add the new profile to the security policy,
edit the policy that allows connections from the internal network to the Internet,
set application control. To use the new profile,
open a Web browser and go to youtube dot com.
An application blocked warning message appears.
Attempt to download a bit torrent file,
then go to System 40. View all sessions and look at the dashboard to see how traffic from BitTorrent applications is also blocked.
Select the 24 hour view and filter the traffic by application to see a list of bit torrent security events.
Thank you for watching. For more information you can access for Nets Documentation Library at doc's dot fortunate dot com.
For more information about preventing SSL inspection certificate warnings, check out this video.