

You can use these applications to distribute bots, spyware, adware, trojans, rootkits, worms, and other types of malware. ĭrops traffic from applications that tunnel other applications, proxy and tunnel applications, and from applications that can bypass firewall policies.ĭrops traffic from file transfer, proxy and tunnel, risk-prone, peer-to-peer networking (P2P), and other applications that cause loss of productivity.īlock high risk (Risk Level 4 and 5) appsĭrops traffic from high-risk applications.ĭrops traffic from P2P applications. To edit a policy, find the policy you want to change and click Edit.

Then, after you save the policy, you can add or edit rules. When you add a policy, you can select any policy as a template. Employees can have access to applications, email and resources on the network from their own home, just as if they were onsite.

