Unused Rules Report

The unused rules report provides a list of rules that were not used during a defined time period, excluding rules that were disabled or not logged.

To create and schedule this report, complete the following steps.

  1. On the toolbar, click System > Reports.

  2. Click Create > Unused Rules Report.
  3. In the General section, complete the following steps.
    1. The Name and Description fields are prepopulated, but can be changed.
    1. Select a Device and Policy to associate to the report.
  4. Complete the Options section.

    1. In the Interval, select Days if you want the interval to run after a set number of days, or Date Range if you want it to run during a specific period of time.
    1. In the Days or Date Range field, select the number of days or date range for which to collect unused rules information.
    2. The following options can be enabled (included) or disabled (not included) in the report output:
      • Click Include Implicit Drop Rules to include all implicit rules in the report.
      • Click Rules with Logging Disabled to include devices that collect logs via hit counters.
      • Click Object Details to include object details in the report, such as IP address/netmask for network objects, and service protocols and ports.

      • Click Group Members to include group member and group member details in the report.
  5. Complete the Scheduling Properties section.
  1. Select a Recurrence from the list, and then select the Enable check box.
  2. Enter a Description (or purpose) for the schedule.
  3. Depending on the Recurrence type selected, additional required field boxes will appear.

Repeat Interval is used to determine how often the report should run during the set Start/End Time. For example, a report set to run daily for a 30-day period with a repeat interval of 2 will run every two days during the set period.

  1. Set a Start Time and End Time. Click the calendar icon to set a day, and the clock icon to set a time.
  1. Complete the Email Notification Settings section.
    1. Select the Users to include. Enter the first few letters of the user's name to search the All Users list.
    2. Enter other recipients in the Additional Email Addresses field. Use a semicolon to separate multiple email addresses.
    3. Select a Report Format output of PDF or CSV.
    4. Optional. Click the Use .ZIP file for email attachment toggle key to enable this feature.
    5. Optional. Click the Sign and encrypt email toggle key to enable this feature.

    Email encryption must be setup to utilize the sign and encrypt email feature.

  1. Click Save.