Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Analyze Security Policy Rules

Juniper Security Director Cloud analyzes security policy rules and recommends actions to ensure optimal use of the rules. You can preview the results of the recommendations before implementing the changes.

Generate the Rule Analysis report for recommendations to optimize security policy rules. You cannot generate the report for individual rules. The Rule Analysis report lists the following types of anomalies:

  • Shadow—Rules with same configuration but different actions

  • Redundant—Rules duplicated with same configuration and actions

  • Expired scheduler—Rules with an expired scheduler that are not implemented as per the configured schedule

  • Logging disabled—Rules whose implementation is not logged

  • Unused—Rules that are not added in any security policy

You can download and send the report to email recipients.

To generate the Rule Analysis report:

  1. Click Security > Security Policies.
    The Security Policies page is displayed.
  2. Click a security policy.
    The security policy page is displayed.
  3. Click Rule Analysis.
    The Rule Analysis report is displayed.
  4. Expand a rule analysis recommendation, and click Accept to implement the recommended action.

    Click Preview to view how the recommendations will impact the rules.

Manage the Rule Analysis Report

  • Download—Click Download arrow symbol to download the Rule Analysis report.

  • Share—Click Share icon for sending content. to share the report with email recipients.