Unused Rules Report
The unused rules report provides a list of rules that were not used during a defined time period, excluding rules that were disabled or not logged.
To create and schedule this report, complete the following steps.
-
On the toolbar, click System > Reports.
- Click Create > Unused Rules Report.
- In the General section, complete the following steps.
- The Name and Description fields are prepopulated, but can be changed.
- Select a Device and Policy to associate to the report.
-
Complete the Options section.
- In the Interval, select Days if you want the interval to run after a set number of days, or Date Range if you want it to run during a specific period of time.
- In the Days or Date Range field, select the number of days or date range for which to collect unused rules information.
- The following options can be enabled (included) or disabled (not included) in the report output:
- Click Include Implicit Drop Rules to include all implicit rules in the report.
- Click Rules with Logging Disabled to include devices that collect logs via hit counters.
Click Object Details to include object details in the report, such as IP address/netmask for network objects, and service protocols and ports.
- Click Group Members to include group member and group member details in the report.
- Complete the Scheduling Properties section.
- Select a Recurrence from the list, and then select the Enable check box.
- Enter a Description (or purpose) for the schedule.
- Depending on the Recurrence type selected, additional required field boxes will appear.
Repeat Interval is used to determine how often the report should run during the set Start/End Time. For example, a report set to run daily for a 30-day period with a repeat interval of 2 will run every two days during the set period.
- Set a Start Time and End Time. Click the calendar icon to set a day, and the clock icon to set a time.
- Complete the Email Notification Settings section.
- Select the Users to include. Enter the first few letters of the user's name to search the All Users list.
- Enter other recipients in the Additional Email Addresses field. Use a semicolon to separate multiple email addresses.
- Select a Report Format output of PDF or CSV.
- Optional. Click the Use .ZIP file for email attachment toggle key to enable this feature.
- Optional. Click the Sign and encrypt email toggle key to enable this feature.
Email encryption must be setup to utilize the sign and encrypt email feature.
- Click Save.