A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
Reyad789
Highly Voted 9 months, 3 weeks agohcir
Highly Voted 9 months, 3 weeks agoThunnu
9 months, 3 weeks agoDjeep12345
9 months, 3 weeks agoDatITGuyTho1337
9 months, 3 weeks agoThunnu
9 months, 2 weeks agohcir
9 months, 3 weeks agoYohinar
Most Recent 2 months, 2 weeks agoBbb78
2 months, 2 weeks ago362c603
3 months, 1 week agoDatITGuyTho1337
2 months, 3 weeks agoredgi0
4 months, 2 weeks ago0d2fdfa
7 months, 2 weeks agoPacketsDownRange99
9 months agoVenomX51
9 months agoJustWondering
9 months agoDatITGuyTho1337
2 months, 3 weeks agotonykolo
9 months, 1 week agorhinogkn24
9 months, 2 weeks agorhinogkn24
9 months, 2 weeks agok3rnelpanicpj
9 months, 2 weeks ago