Home » Getting Started » The Compliance Tab

Firewall Compliance Reports


Firewall Analyzer offers a rich set of compliance and device management reports that will help you in meeting the various compliance/security audit requirements and optimizing the device rules, configurations to secure the network.

Compliance tab

You can export the compliance in to PDF or CSV formats. The export format has limitations from report to report. The time period for which the compliance report generated is displayed. The time period can be selected from the calendar available on the left side of the screen.

The compliance reports in Firewall Analyzer are classified into the following types:

  • Policy Overview
  • Change Management
  • Compliance
  • Policy Optimization

On the top right side of the page, there are links to view, Device Rules, the Device Rule Info page, Profiles, the Credential Profile Listing page, Exclude Criteria, the Exclude Criteria List page.

The compliance reports are generated device-wise. You can add/edit/delete device rules to fetch the ACLs and configurations. Same way, you can add/edit/delete device rule profiles. You can Exclude Criteria for compliance report generation.

The following sections available on top of the page:

  • Device Information
  • Last Generated Reports
  • On Demand reports

Device Information

In this section, the connection status between the device and Firewall Analyzer, actions to edit the device info or enable/ disable notification, last modified time of device information.

Last Generated Reports

This section displays the Last Generated Reports, the Compliance report and the Change Management reports with the time of report generation. If the device is not configured to generate these reports, it can be configured from here on the fly.

On Demand reports

This section displays the On Demand reports generated based on Firewall configurations and ACLs/Rules:

  • Configuration Analysis
  • Security Audit
  • Complete Analysis
  • Configuration Changes
  • Fetch Rules - the raw configuration of firewall is fetched in a flat file on demand
  • Export Config

Security audit and configuration analysis reports are supported for all firewall devices.

Policy Overview report

It contains the following reports:

  • Rule Details
  • Unused rules

Change Management reports

It contains the following reports:

  • Configuration Change Reports
  • Startup - Running Conflict Report

Compliance reports

In the compliance reports, you can edit the settings of the device for which the compliance report is displayed.

It contains the following regulatory compliance reports:

  • PCI-DSS
  • ISO 27001 (2013)
  • NERC-CIP
  • NIST
  • SANS

Policy Optimization

In the policy optimization reports, you get a variety of policy anomaly reports, which will aid you to optimize the performance of firewall policies.

The anomaly reports are, Correlation, Generalization, Grouping, Redundancy, and Shadow. The reports will be displayed in the graphical and tabular format.

 

Copyright © 2014, ZOHO Corp. All Rights Reserved.
ManageEngine