Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Firewall Central Manager Admin Guide

English

Print Help Download Help
Intrusion Prevention > Manage Application Identification Rulesets
  • Introduction To Dome Firewall Central Manager
    • Sign-up For Firewall Central Manager
    • Setup Dome Firewall Central Manager
    • Integrate Central Manager With Comodo One / Comodo Dragon / ITarian
    • Login To The Admin Console
    • Change Password
    • Add Organizations
    • Enroll Dome Firewall Devices
  • The Main Interface
  • The Dashboard
    • View Details Of A Firewall Device
    • Quick Actions On A Firewall Device
      • Backup/Restore A Firewall Device
      • Configure SSH Access For A Firewall Device
      • Network Configuration
    • Access Admin Console Of A Firewall Device
  • Manage System Status And General Configuration
    • Update Firmware Version
    • View And Upgrade Central Manager License
    • View Management Tasks
  • Customer Management
    • Manage Organizations
    • Activate Firewall Licenses
  • Approve Firewall Device Enrollment
  • Add Interfaces
  • Firewall Management
    • Configure Firewall Policy Rules
    • Manage Firewall Address Objects
    • Manage Firewall Object Groups
    • Configure Destination Network Address Translation Rules
    • Configure Source Network Address Translation Rules
    • Configure System Access Rules
  • Configure Virtual Private Network Settings
    • Configure IPSec/L2TP Users
    • IPSec Configuration
    • Configure L2TP Server
  • Manage Advanced Threat Protection Profiles
  • Manage URL And Content Filtering Profiles
  • Intrusion Prevention
    • Configure The Intrusion Prevention System
    • Manage IPS Rulesets
    • Manage Application Identification Rulesets
  • About Comodo Security Solutions

Manage Application Identification Rulesets

 

  • Click 'Intrusion Prevention' > 'Application Identification' in the left-hand menu.
    • Application identification rules intercept traffic from specific apps and allow or block that traffic according to your preference.
      • The interface shows rules that are currently loaded in the default profile for the selected organization or device.

      To configure Application Identification Rulesets

      • Click 'Intrusion Prevention' >'Application Identification'
      • Select the organization/device from the drop-down in the title bar
      • Organization - Configure rulesets that can be applied to all devices in the organization.
      • Device - Configure rulesets that can be applied to a specific device.




      AppId Rule List - Column Descriptions

      Column

      Description

      Rule filename

      The label of the rules file that contains the constituent rules of the ruleset.

      Rules count

      Indicates the number of constituent rules in the rule set.

      Actions

      Displays control buttons for the ruleset.

      / - Indicates whether the ruleset is currently enabled or disabled.

      • Click on the icon to toggle the enabled/disabled status
      • See Enable/Disable rulesets for more details.

      / - Indicates the application policy of the ruleset.

      • Click on the icon to toggle the application policy between 'Alert' and 'Drop' policies.
      • See Change application policy of rulesets for more details.


      Enable/Disable rulesets

       

      Rulesets can be enabled or disabled individually or collectively:

      • Enable a single ruleset - Click the icon in the 'Actions' column 
      • Disable a single ruleset - Click the icon in the 'Actions' column 
      • Multiple rulesets - Select rulesets using the check-boxes on the left. Click the 'Enable' or 'Disable' button as required 
      • Any changes will be saved to the default profile and immediately applied to devices on which the profile is active

      Change application policy of rulesets


      Rule actions are the responses you want the firewall to take if the conditions of a rule are met. There are two options:

      • Alert – Will allow the packet to pass and will generate an alert. An alert policy is indicated by a yellow triangle in the 'Actions' column - .

      • Drop – Will block the data packet without generating an alert. A drop policy is indicated by a shield icon in the 'Actions' column - .

      Any changes will be saved to the default profile and immediately applied to devices on which the profile is active.

      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.