A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
Reyad789
Highly Voted 1 year agohcir
Highly Voted 1 year agoThunnu
1 year agoDjeep12345
1 year agoDatITGuyTho1337
1 year agoThunnu
1 year agohcir
1 year agoTeachTrooper
Most Recent 2 months, 1 week agoYohinar
5 months, 3 weeks agoBbb78
5 months, 3 weeks ago362c603
6 months, 2 weeks agoDatITGuyTho1337
6 months agoredgi0
7 months, 3 weeks ago0d2fdfa
10 months, 3 weeks agoPacketsDownRange99
1 year agoVenomX51
1 year agoJustWondering
1 year agoDatITGuyTho1337
6 months agotonykolo
1 year agorhinogkn24
1 year agorhinogkn24
1 year agok3rnelpanicpj
1 year ago