Now that you have a basic security policy,
you can review the statistics and data in the Application Command
Center (ACC), traffic logs, and the threat logs to observe trends
on your network. Use this information to identify where you need
to create more granular security policy rules.