Determine the Security policy rules you need to tighten
to improve security using using the Best Practice Assessment tool.
After you identify a gap in security policy
capability adoption, use the
to list rules that require further investigation or remediation.
to match the gap
identification criteria you developed when you identified gaps in
adoption. This results in rule lists you can export and hand
off to the operational team in charge of firewall Security policy.
example, to create a Rule Detail filter to identify rules that allow
all traffic and don’t have a Vulnerability Protection profile configured:
In the Heatmaps section of the BPA, click
the filter options and then select the following filters:
Source Zone =
Destination Zone =
Source Address Configured =
Destination Address Configured =
Rule Enabled =
Vulnerability On =
The BPA lists the rules that match the filters:
To export the filtered rule list to a .csv file, click