Security Policy Rule Analysis Overview
Juniper Security Director Cloud analyzes security policy rules and recommends actions to ensure optimal use of the rules.
The Rule Analysis report lists the following types of anomalies:
-
Shadow—Rules with same configuration but different actions
-
Redundant—Rules duplicated with same configuration and actions
-
Expired scheduler—Rules with an expired scheduler that are not implemented as per the configured schedule
-
Logging disabled—Rules whose implementation is not logged
-
Unused—Rules that are not added in any security policy
The Rule Analysis feature also recommends actions you must take on the security rule. The feature also enables you to preview the results of its recommendations. The feature does not analyze individual rules.
You can also download and send the report to email recipients.