Obsolete or outdated firewall
rules introduce unnecessary security risks that can be exploited
by an attacker to execute a successful cyber attack. With
rule usage tracking, you
can readily identify unused rules, validate additions to the rulebase,
and evaluate whether the policy implementation matches your enforcements
needs. This capability gives you a way to identify obsolete rules
to aid in the transition from port-based rules to App-ID based rules.
The statistics for monitoring rule use include a timestamp for the
most recent rule match, a timestamp for the first rule match, and
a rule hit counter.