Applications

What Are Applications?

Applications are the first consideration when Shield applies policy to a connection. They allow Rules to determine the source of the data and apply the correct behavior.

The Applications page in the Admin Console lists all defined applications and basic details about each one.


Application Components

Each Application consists of the following:

  • Name (required)
    A unique identifier used in rule creation and displayed in activity logs.

  • Description (optional)
    Free-form text to provide context, documentation, or notes for future reference.

  • Definitions (required, one or more)
    Rules that determine how Shield recognizes the application from the traffic.


Creating a New Application

To define a new application:

  1. Click Add New Application in the upper-right corner.
  2. In the slide-out panel, enter the Name and optional Description.
  3. Add one or more Definitions by clicking on the Add button below the Definitions table. See below for definition details.
  4. Click Save to finalize the application.

Editing or Deleting an Application

To Edit:

  • Hover over the application name.
  • Click the three-dot menu and choose Edit.
  • Modify values as needed and click Save.
    • Individual Definitions can be edited using their own three-dot menu.

To Delete:

  • Hover over the application name.
  • Click the three-dot menu and choose Delete.

Application Definitions

To identify which application a connection belongs to, Shield analyzes the browser request URL. Each definition type targets a specific part of the URL.

Available Definition Types

Type Description
Domain Matches the domain portion of the URL. E.g., "company.com" matches both https://www.company.com and https://app.company.com.
Hostname Matches the full hostname. E.g., "app.company.com" matches https://app.company.com but not https://www.company.com.
Full URL Matches the entire URL. Full URL is unlikely to be useful by itself, but can be used to fine tune an Application Definition using the advanced settings (see below)
Path Matches folders or subfolders in the URL.
Query String Matches anything after a ? in the URL.
Object Part Matches the object being requested, regardless of host or path.
Regex Allows full use of regular expressions to allow for very fine grained control over URL matching.

Wildcard Usage in Definitions

All definition types support the use of wildcards (*) for flexible matching.

Examples

  • Domain:
    "*company.com" matches www.company.com, www.my-company.com, www.your-company.com.

  • Hostname:
    "server*.company.com" matches server1.company.com and server2.company.com, but not www.company.com.

  • Object:
    "*.jpg" can be used to exclude images (when used with bypass).

  • Query String:
    "data=" matches any URL query that includes data=, regardless of what follows.


Advanced Options

By default, each Definition is a matching rule. Advanced Settings can be used to change this to bypass, or add fine-grained control to exactly which transactions will be affected.

  • Behavior:
    A Match rule means that policy will be applied to these Definitions. A Bypass rule means that policy will not be applied.

    • Example: a domain match definition for company.com could be combined with a hostname bypass definition for blog.company.com to avoid applying rules to the blog section of an App.
  • Method:
    Used to restrict which HTTP Methods will be matched or bypassed. Select as many as needed. Selecting none will match all methods.

  • Content Type:
    Used to restrict the filter to requests with a specific Content-Type header. Running content type detection, Shield will attempt to infer the content type dynamically based on the payload itself, even if the Content-Type header is incorrect or missing.

    • Example: if a server sends a JSON payload but uses Content-Type: text/html, enabling this option allows the filter to still detect and match it correctly.
Advanced Settings Summary
Field Type Description
Behaviour Enum (Match, Bypass) Defines whether this is a matching or exclusion rule
Method Multi-select (HTTP verbs) Filters requests based on HTTP method
Content Type Multi-select (MIME types) Filters requests based on Content-Type header
Run Content-Type Detection Checkbox Dynamically detect actual content type, useful when headers are wrong or missing

Summary

Applications serve as the first layer of policy evaluation. By accurately identifying the application associated with a connection, Shield ensures that the correct masking or access rules are applied.