Analyze Security Policy Rules
Generate the Rule Analysis report for recommendations to optimize security policy rules. You cannot generate the report for individual rules. The Rule Analysis report lists the following types of anomalies:
-
Shadow—Rules with same configuration but different actions
-
Redundant—Rules duplicated with same configuration and actions
-
Expired scheduler—Rules with an expired scheduler that are not implemented as per the configured schedule
-
Logging disabled—Rules whose implementation is not logged
-
Unused—Rules that are not added in any security policy
You can download and send the report to email recipients.
To generate the Rule Analysis report:
Manage the Rule Analysis Report
-
Download—Click
to download the Rule Analysis
report. -
Share—Click
to share the report
with email recipients.