Now that you have a basic security policy,
you can review the statistics and data in the Application Command
Center (ACC), traffic logs, and the threat logs to observe trends on
your network. Use this information to identify where you need to
create more granular security policy rules.