Firewall Analyzer provides elaborate compliance report for the Firewall devices and can be used for firewall security auditing. The report helps to configure the Firewall rules, which will prevent potentially dangerous access to network and allow only those network hosts that are required. The report identifies all the Firewall security related issues. This firewall configuration audit tool audits the complete Firewall security and provides detailed firewall configuration analysis. It also provides a firewall security audit report and a firewall security audit checklist with an overall security rating. The reports identify the security issues in the device. The impact of the issues on the device security are rated for their severity. The easiness to fix the issue is assessed. Based on the issues, the report recommends security best practices. It categorizes the threats faced to various levels and recommends configuration and other changes to tighten the security of the Firewall.
It rates the issues in five categories. They are: Critical, High, Medium, Low, and Info
The issues are assessed and the results are presents as statistics. The report consists of three sections. They are:
This section of the report describes the following: identifying the issue, impact of the issue, ease of exploiting the issue and recommendation and overall rating of the issue.
This section of the report describes the security best practices. It consists of overview and recommendation. It covers the following areas:
This section details the configuration settings of the Firewall device.
The report is generated at periodic intervals and the report link in the UI shows the time, the compliance report was generated.
You can instantly generate the Compliance report, any time you want.
The firewall configuration analyzer module configures the device credential or assigns a credential profile to the device. On assigning a device profile or configuring device credentials, the compliance report will get generated automatically.