Highly Used Rules Low in the Rule Base Report
The highly used rules low in the rule base report provides security rules that are highly used and are low in the rule base, which can cause performance problems.
To run this report, complete the following steps.
- On the toolbar, click Reports > Reports Library.
- In the Reports Library table, click Highly Used Rules in the Rule Base Report.
- Complete the General section.
- The Name and Description fields are prepopulated, but can be changed.
- Select a Device to associate to the report.
- Complete the Options section.
In the Highly Used Rules Percentage field, enter the percentage of highly used rules to be evaluated.
- In the Rule Location Percentage field, enter the percentage of least-used rules to be evaluated.
- Select an Interval - Days or Date Range - and then set the appropriate time.
- Click Object Details to include object details in the report, such as IP address/netmask for network objects, and service protocols and ports.
- Click Group Members to include group member and group member details in the report.
- Select HTML, PDF, or CSV as the Report Format export type.
- Click Run Report.