Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Security Director Cloud User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Security Policy Rule Analysis Overview

date_range 24-Feb-25

Juniper Security Director Cloud analyzes security policy rules and recommends actions to ensure optimal use of the rules.

The Rule Analysis report lists the following types of anomalies:

  • Shadow—Rules with same configuration but different actions

  • Redundant—Rules duplicated with same configuration and actions

  • Expired scheduler—Rules with an expired scheduler that are not implemented as per the configured schedule

  • Logging disabled—Rules whose implementation is not logged

  • Unused—Rules that are not added in any security policy

The Rule Analysis feature also recommends actions you must take on the security rule. The feature also enables you to preview the results of its recommendations. The feature does not analyze individual rules.

You can also download and send the report to email recipients.

footer-navigation