<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Compliance Blade Question. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24806#M95445</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the Compliance blade, does it provide the ability to report on&amp;nbsp;unused objects?&lt;/P&gt;&lt;P&gt;Also can you determine what services are being used on a specific rule that has ANY applied as the service?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 May 2018 19:48:38 GMT</pubDate>
    <dc:creator>Dave_Taylor1</dc:creator>
    <dc:date>2018-05-17T19:48:38Z</dc:date>
    <item>
      <title>Compliance Blade Question.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24806#M95445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the Compliance blade, does it provide the ability to report on&amp;nbsp;unused objects?&lt;/P&gt;&lt;P&gt;Also can you determine what services are being used on a specific rule that has ANY applied as the service?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2018 19:48:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24806#M95445</guid>
      <dc:creator>Dave_Taylor1</dc:creator>
      <dc:date>2018-05-17T19:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Compliance Blade Question.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24807#M95446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't believe you need Compliance Blade for either of these tasks.&lt;/P&gt;&lt;P&gt;You can get a list of unused objects here (though this generates a script to delete them):&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-2730"&gt;Delete Unused Hosts, Networks, and Groups&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see what services are used for a given rule in SmartLog:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65647_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2018 23:27:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24807#M95446</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-05-17T23:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Compliance Blade Question.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24808#M95447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Compliance Blade alerts you on services with Any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does not currently alert you on unused objects. It is planned for our next releases. For now, you can use the "show unused-objects" Management API command -&amp;nbsp;&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-unused-objects~v1.1%20" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-unused-objects~v1.1%20"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 May 2018 19:35:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24808#M95447</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-05-22T19:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Compliance Blade Question.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24809#M95448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is good stuff! WE were hoping the compliance blade provides some of the things the more expensive auditing tools like Firemon, Tuffin&amp;nbsp; or Algosec provide.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 13:31:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Compliance-Blade-Question/m-p/24809#M95448</guid>
      <dc:creator>Dave_Taylor1</dc:creator>
      <dc:date>2018-05-25T13:31:56Z</dc:date>
    </item>
  </channel>
</rss>

