Monitor Policy Rule Usage
How to view rule usage for policy rules pushed to a device group from Panorama.
As your policies change, tracking rule usage on Panorama helps you evaluate whether your policy implementation continues to match your enforcement needs. This visibility helps you identify and remove unused rules to reduce security risks and keep your policy rule base organized. Additionally, rule usage tracking allows you to quickly validate new rule additions and rule changes and to monitor rule usage for operations and troubleshooting tasks. On Panorama, you can view the rule usage of firewalls in a device group—to which you pushed policies—to determine if all, some, or none of the firewalls have traffic matches instead of being able to monitor only the total number of hits across all firewalls in a device group. You can quickly filter rules using the rule usage data, such as Created and Modified dates, within a customizable time frame. The displayed rule usage information persists across reboot, dataplane restarts, and upgrades.
On Panorama, you can view the rule usage details for managed firewalls that are running a PAN-OS 8.1 or later release, that have policy rule hit count enabled (default), and for which you have defined and pushed policy rules using device groups. Panorama cannot retrieve rule usage details for policy rules configured locally on the firewall so you must log in to the firewall to view rule usage information for locally configured rules.
After filtering your policy rulebase, administrators can take action to delete, disable, enable, and tag policy rules directly from the policy optimizer. For example, you can filter for unused rules and then tag them for review to determine whether they can be safely deleted or kept in the rulebase. By enabling administrators to take action directly from the policy optimizer, you reduce the management overhead required to further assist in simplifying your rule lifecycle management and ensure that your firewalls are not over-provisioned.
To view the rule usage across any Shared rule or for a specific device group:
- Verify that thePolicy Rule Hit Countis enabled.
- Navigate to Policy Rulebase Settings (.PanoramaSetupManagement
- Verify thatPolicy Rule Hit Countis enabled.
- Selectto view a rule.Policies<policy rule>
- Change the Device Group context toSharedor to the specific device group you want to view.
- Determine whether the rule is being used (Rule Usage). The policy rule usage status is one of the following:Firewalls must run PAN-OS 8.1 or later release with Policy Rule Hit Count enabled for Panorama to determine rule usage.
- Used—When all firewalls in the device group—to which you pushed the policy rule—have traffic matches for the policy rule.
- Partially Used—When some of the firewalls in the device group—to which you pushed the policy rule—have traffic matches for the policy rule.
- Unused—When no firewalls in the device group—to which you pushed the policy rule—have traffic matches for the policy rule.
- Em-dash (—)—When no firewalls in the device group—to which you pushed the policy rule—have Policy Rule Hit Count enabled or available for Panorama to determine the rule usage.
- Modified—The date and time the policy rule was last modified.
- Created—The date and time the policy rule was created.If the rule was created when Panorama was running PAN-OS 8.1 and the Policy Rule Hit Count setting is enabled, the First Hit date and time is used as the Created date and time on upgrade to PAN-OS 9.0 or later releases. If the rule was created in PAN-OS 8.1 when the Policy Rule Hit Count setting was disabled or if the rule was created when Panorama was running PAN-OS 8.0 or an earlier release, the Created date for the rule will be the date and time you successfully upgraded Panorama to PAN-OS 9.0 or later releases.
- Click the Rule Usage status to view the list of firewalls using the rule and the hit-count data for traffic that matches that rule on each firewall.
- (Optional) View the policy rule hit-count data for individual appliances in the device group.
- ClickPreview Rules.
- From the Device context, select the appliance for which you want to view the policy rule usage data.
- SelectPoliciesand, in the Policy Optimizer dialog, view theRule Usagefilter.
- Filter rules in the selected rulebase.You can filter the rule usage for rules pushed to firewalls from Panorama. Panorama cannot filter rule usage for rules configured locally on the firewall.Use the rule usage filter to evaluate the rule usage within a specified period of time. For example, filter the selected rulebase for Unused rules within the last 30 days. You can also evaluate rule usage with other rule attributes, such as the Created and Modified dates, which enables you to filter for the correct set of rules to review. You can use this data to help manage your rule lifecycle and to determine if a rule needs to be removed to reduce your network attack surface.
- Select theTimeframeyou want to filter on, or specify aCustomtime frame.
- Select the ruleUsageon which you want to filter.
- (Optional) If you have reset the rule usage data for any rules, check forExclude rules reset during the lastand decide when to exclude a rule based on the number of days you specify since the rule was reset. Only rules that were reset before your specified number of days are included in the filtered results.<number of days>days
- (Optional) Specify search filters based on additional rule data, other than the rule usage.
- Hover your mouse over the column header, and from the drop-down selectColumns.
- Add any additional columns you want to filter with or to display.
- Hover your mouse over the column data that you would like to filter, and selectFilterfrom the drop-down. For data that contain dates, select whether to filter usingThis date,This date or earlier, orThis date or later.
- ClickApply Filter( ).
- Take action on one or more unused policy rules.
- Select one or more unused policy rules.
- Perform one of the following actions:
- Delete—Delete one or more selected policy rules.
- Enable—Enable one or more selected policy rules when disabled.
- Disable—Disable one or more selected policy rules.
- Tag—Apply one or more group tags to one or more selected policy rules. The group tag must already exist in order to tag policy rule.
- Untag—Remove one or more group tags from one or more selected policy rules.
- SelectCommitandCommit and Pushyour changes.
Recommended For You
Recommended videos not found.