Policy review provides Network Engineers, Network Security, and Compliance Analysts with tools for:
- Easy review of firewall access rules and object groups using the Access Rules and Object Groups reports.
- Automatic identification of configuration risks using the Risks and Warnings report.
- Utilizing information to establish a configuration change review process using the Change Tracking report.
The Access Rules report provides the users with complete details on each Access Rule with the ability to add justifications and actions.
The Object Groups report provides the users with complete details on each Object Group with the ability to add justifications and actions.
Risks and Warnings
As modifications are made to the network, the Network Perception default Policies and Requirements identify potential risks. The Risks and Warnings report provides the users with a summary of the potential risks and their criticality with the ability to add actions and comments.
As modifications are made to the network and the updated configuration files are imported, the changes are logged in the Change Tracking table.