After you
Enable
User-ID, you will be able to configure
Security
Policy that applies to specific users and groups. User-based
policy controls can also include application information (including
which category and subcategory it belongs in, its underlying technology,
or what the application characteristics are). You can define policy
rules to safely enable applications based on users or groups of
users, in either outbound or inbound directions.