<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identify shadow rules in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162822#M70346</link>
    <description>&lt;P&gt;One common optimization tactic is to eliminate rules that have zero hit count.&lt;BR /&gt;There is a script for that:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40005" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40005&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Nov 2022 17:22:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2022-11-22T17:22:22Z</dc:date>
    <item>
      <title>Identify shadow rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162765#M70344</link>
      <description>&lt;P&gt;Is there a way to identify the shadow or redundant rules? I have used Algosec with a different customer, with latest R81.x I heard that Algosec is not feasible because of the layers and zone based policies. There are few thousands of rules that need to be reconciled across multiple gateways and I need to know a way to do this effectively. Has anyone been in a similar situation and has a solution for this?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 12:41:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162765#M70344</guid>
      <dc:creator>aharihara</dc:creator>
      <dc:date>2022-11-22T12:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Identify shadow rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162768#M70345</link>
      <description>&lt;P&gt;SmartOptimize or other analysis leveraging the APIs seem like the most logical approach.&lt;/P&gt;
&lt;P&gt;sk161574 may also be relevant here.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 12:51:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162768#M70345</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-11-22T12:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Identify shadow rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162822#M70346</link>
      <description>&lt;P&gt;One common optimization tactic is to eliminate rules that have zero hit count.&lt;BR /&gt;There is a script for that:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40005" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40005&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 17:22:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162822#M70346</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-22T17:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Identify shadow rules</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162827#M70347</link>
      <description>&lt;P&gt;I agree with the guys. I will tell you what I always do...is it best way to do this, probably not, but I find it useful. I simply export the rules in CSV format and then look for zero hits and also disabled rules.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18508i394E9A06F5C5A6F2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_2.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18509iC8EEAEECBE487BD5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_2.png" alt="Screenshot_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 17:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identify-shadow-rules/m-p/162827#M70347</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-22T17:31:03Z</dc:date>
    </item>
  </channel>
</rss>

