Application-Specific Notes and Limitations
-
Office 365 Admin Portal:
Limitation: If the access policy has logging enabled at the beginning as well as at the end, the first packet will be detected as Office 365 and the end of connection will be detected as Office 365 Admin Portal. This should not affect blocking.
-
Skype:
-
GoToMeeting
In order to fully detect GoToMeeting, your rule must include all of the following applications:
-
GoToMeeting
-
Citrix Online
-
Citrix GoToMeeting Platform
-
LogMeIn
-
STUN
-
-
Zoho:
-
Evasive applications such as Bittorrent, Tor, Psiphon, and Ultrasurf:
For evasive applications, only the highest-confidence scenarios are detected by default. If you need to take action on this traffic (such as block or implement QoS), it may be necessary to configure more aggressive detection with better effectiveness. To do this, contact TAC to review your configurations as these changes may result in false positives.
-
WeChat:
It is not possible to selectively block WeChat Media if you allow WeChat.
-
RDP (Remote Desktop Protocol):
If allowing the RDP application does not allow file transfers, ensure that the rule for RDP includes both the TCP and UDP port 3389. RDP file transfer uses UDP.