The appid Keyword

You can use the appid keyword to identify the application protocol, client application, or web application in a packet. For example, you could target a specific application that you know is susceptible to a specific vulnerability.

Within the appid keyword of an intrusion rule, click Configure AppID to select one or more applications that you want to detect.

Browsing the Available Applications

When you first start to build the condition, the Available Applications list is unconstrained and displays every application the system detects, 100 per page:

  • To page through the applications, click the arrows underneath the list.

  • To display a pop-up window with summary information about the application’s characteristics, as well as Internet search links that you can follow, click Information (import section icon) next to an application.

Using Application Filters

To help you find the applications you want to match, you can constrain the Available Applications list in the following ways:

  • To search for applications, click the Search by name prompt above the list, then type a name. The list updates as you type to display matching applications.

  • To constrain the applications by applying a filter, use the Application Filters list. The Available Applications list updates as you apply filters. For your convenience, the system uses an Unlock icon to mark applications that the system can identify only in decrypted traffic—not encrypted or unencrypted.

Note

If you select one or more filters in the Application Filters list and also search the Available Applications list, your selections and the search-filtered Available Applications list are combined using an AND operation.

Selecting Applications

To select a single application, select it and click Add to Rule. To select all applications in the current constrained view, right-click and select Select All.