Hi..Spopovic, you can create Policy objects. The firewall operates on abstract objects so that an end-point can be an object defined as: A host with a 32 bit subnet mask A network A named object A member of a group A user A service or group of services Applications Rules can be very general, and very specific. More specific rules precede general rules. How are applications identified? There are four technologies involved: Protocol decoder Protocol decryption Application signature Heuristics How do I manage so many applications? The Palo Alto firewall has a Graphical User Interface available through a standard web browser. One of the GUI screens provides the following search-able organizational categories: Category - (like business, networking...) Sub category - (like email, gaming...) Technology - (like browser or peer-to-peer) Characteristic - (like 'evasive' or 'tunnels other applications') Risk level. The risk level is a finger-in-the air enumeration which loosely categorizes how risky is the application. These risk levels are customizable, but there is little point in trying to do so since a new set of application signatures could upset your particular impression of risk, and trying to single-handedly manage all the risk levels raises some serious administrative overhead. You can search applications by name, select by groups, manage the content of groups, and create a filter which dynamically generates a group. Specific applications, statically defined groups, and dynamically generated groups can each be used in the policy. The huge advantage of this approach is how it reduces the firewall administrator's overhead in maintaining policy. If your corporate security policy says, 'Deny Instant Messaging (IM)', then it's easy to create a dynamic rule called 'Instant messaging' and use that in a single deny rule. If a new IM technology is invented, then it will be included in the next application signature release, and the security policy requires no changes. or many more please visit : - How to Check if an Application Needs to have Explicitly Allowed Dependency Apps
... View more