The applications defined by Application Types are identified by the direction of traffic,
the protocol being used, and the port number through which the traffic passes. Application
Types are useful for grouping intrusion prevention rules.that have a common purpose.
Rule groups simplify the process of selecting a set of intrusion prevention rules
to assign to a computer. For example, consider the set of rules required to protect
HTTP traffic to an Oracle Report Server. Simply select the rules in the "Web Server
Common" and "Web Server Oracle Report Server" application types and then exclude unneeded
rules, such as the rules that are specific to IIS servers.
See a list of application types
Open the list of application types where you can see the properties of existing application
types, as well as configure, export, and duplicate them. You can export to XML or
CSV files. You can import XML files. You can also create and delete application types.
Procedure
- Click .
- Click Application Types.
- To apply a command to an application type, select the type and click the appropriate button.
What to do next
TipApplication types that have configurable properties have an icon with a gear.
|
General Information
The name and description of the Application Type. "Minimum Agent/Appliance Version"
tells you what version of the agent is required to support this Application Type.
Connection
- Direction: The direction of the initiating communication. That is, the direction of the first packet that establishes a connection between two computers. For example, if you wanted to define an Application Type for Web browsers, you would select "Outgoing" because it is the Web browser that sends the first packet to a server to establish a connection (even though you may only want to examine traffic traveling from the server to the browser). The Intrusion Prevention Rules associated with a particular Application Type can be written to examine individual packets traveling in either direction.
- Protocol: The protocol this Application Type applies to.
- Port: The port(s) this Application Type monitors. (Not the port(s) over which traffic is exclusively allowed.)
Configuration
The Configuration tab displays options that control how Intrusion Prevention Rules associated with
this Application Type behave. For example, the "Web Server Common" Application Type
has an option to "Monitor responses from Web Server". If this option is deselected,
Intrusion Prevention Rules associated with this Application Type will not inspect
response traffic.
Options
Items in the Options tab control how Server & Workload Protection
uses and applies the Application Type. For example, most Application Types have
an option to exclude them from Recommendation Scans. This means that if the
"Exclude from Recommendations" options is selected, a Recommendation Scan will
not recommend this Application Type and its associated Intrusion Prevention
Rules for a computer even if the application in question is detected.
Assigned To
The Assigned To tab lists the Intrusion Prevention Rules associated with this Application Type.