This help contains the following topics:
| This feature parses personal information from user packets and must be used for legitimate purposes. |
Based on application recognition (APR), application audit audits and records Internet access behaviors of users by identifying behaviors and behavior contents of applications.
Applications and programs are characterized by different behaviors. For example, IM applications are characterized by login and message sending. FTP is characterized by file upload and file download.
A behavior content is the content of a behavior. For example, the content of a login behavior is the account information. The content of an FTP file upload behavior is the file name. You can match behavior contents by using a string or a number.
Figure-1 Application audit process
Different audit policies process matching packets differently.
Application audit policies have the following types:
Multiple application audit policies can exist on a device. The device compares a packet with policies in their configuration order. When a match is found, the match process ends. If no match is found, the device applies the default action to the packet.
You can view the configuration order of policies on the
Multiple match criteria can be configured in an application audit policy. A policy is matched if all match criteria in the policy are matched.
The following match criteria are available:
Source and destination security zones.
Source and destination IP addresses.
Users/user groups.
Applications/application groups.
Services.
Time ranges.
One match criterion can contain multiple match values. For example, you can configure multiple address object groups for a source IP address match criterion. A match criterion is matched if any of its match values is matched.
Audit rules can be configured for an audit policy to perform more granular control on user behaviors and to generate audit logs.
The following rule match modes are available:
If a packet matches a rule with the permit action, all subsequent rules continue to be matched.
The device takes the action with higher priority on matching packets. The deny action has higher priority than the permit action.
If a packet matches a rule with the deny action, the device stops the match process and performs the deny action.
The device processes packets as follows based on the match result:
If a packet matches all items in an audit rule, the action in the audit rule is taken on the packet.
If a packet matches only the specified application or application category in an audit rule, the packet is allowed to pass through.
If a packet does not match the specified application or application category in an audit rule, the default action for audit rules is taken on the packet.
Email protection can be configured in a rule. The device detects incoming emails, counts emails based on recipients, and protects recipients from attacks. Specifically, you can configure the following functions:
Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
Application auditing is based on application recognition (APR). To use application auditing, you must purchase and install the required license. After the license expires, the application auditing feature is available through the existing APR signature library, but you cannot update the APR signature library. For more information about licensing, see the license management help.
Figure-2 shows the configuration procedure for application audit.
Figure-2 Application audit configuration procedure
Before configuring application audit, configure security policies to allow traffic to flow through the device. For information about configuring security policies, see "Security Policy Help."
Complete the following tasks before you configure this feature:
Assign IP addresses to interfaces on the
Configure routes on the
Create security zones on the
Add interfaces to security zones. You can add interfaces to a security zone on the
Configure security policies to permit the target traffic on the
Purchase and install the APR license.
Upgrade the APR signature library to the most recent version on the official website.
Select
Click
Create an application audit policy.
Figure-3 Creating an application audit policy
Figure-4 Configuring the parameters of an application audit policy
Table-1 Application audit policy configuration items
Item | Description |
Name | Enter a name for the application audit policy. |
Type | Select the application audit policy type: Audit, Audit-free, and Deny. |
Enable | Enable the policy to make it take effect. |
Source security zone | Specify a source security zone as a match criterion. |
Destination security zone | Specify a destination security zone as a match criterion. |
Source IP address | Specify a source IP address object group as a match criterion. |
Destination IP address | Specify a destination IP address object group as a match criterion. |
Service | Specify a service object group as a match criterion. |
User | Specify a user as a match criterion. |
Application | Specify an application or application group as a match criterion. |
Time range | Specify a time range during which the policy is in effect. |
On the audit policy creation page, click
Figure-5 Creating an audit rule
Figure-6 Confguring the parameters of an audit rule
Table-2 Audit rule configuration items
Item | Description |
Rule ID | Enter a rule ID. |
Application | Select the applications to be audited. |
Behavior | Select the behaviors to be audited. |
Behavior content | Select the behavior contents to be audited. |
Match type | Specify the behavior content type:
|
Keyword | Operator used when behavior contents are matched:
|
Email protection | Select |
Limit email sending | Select |
Prevent email bombing | Configure this function to protect recipients from being overwhelmed by large numbers of emails from the same sender during a short period of time.
|
Action | Select an action to take on packets matching audit rules: |
Logging | Select |
Click
Click
Figure-7 Application audit policy created successfully
Select
Click
Figure-8 Clicking
Click
Figure-9 Creating a keyword group
Figure-10 Configuring the parameters of a keyword group
Table-3 Keyword group configuration items
Item | Description |
Name | Enter a name for the keyword group. |
Description | Enter a description for the keyword group, which helps the administrator identify the keyword group. |
Keyword | Enter keywords to be audited. Keywords are separated by carriage returns. |
Click
Figure-11 Keyword group created successfully