<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS) in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40014#M2571</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds good. I’ll be interested to see. I’m going to send you my check Point email as well so we can work offline and report back&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 May 2018 22:51:51 GMT</pubDate>
    <dc:creator>Adam_Forester</dc:creator>
    <dc:date>2018-05-28T22:51:51Z</dc:date>
    <item>
      <title>Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40005#M2562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;**v3 and above now allows you to pick a specific access layer**&amp;nbsp;&lt;/P&gt;&lt;P&gt;**v4 added new functions thanks to user feedback. Now has the ability to navigate around section title headers and to handle of any size**&lt;/P&gt;&lt;P&gt;**v5 with a lot of work by &lt;A href="https://community.checkpoint.com/migrated-users/50398"&gt;Vincent Bacher&lt;/A&gt;‌ he determined that some larger policies need a time specified to search. This version added in a 6 month limit on hits prior to the day you run it (Today - 6Months.)**&lt;/P&gt;&lt;P&gt;** v6 combined MDS &amp;amp; SMS into a single script. Added the ability to disable or delete rules based&amp;nbsp;on UID or NAME. The disable script will add a commend 'Disabled by Zero Hits'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a simple shell script that will allow you to parse a&amp;nbsp;specific&amp;nbsp;rulebase&amp;nbsp;for rules with a ZERO hit count. The results will be output into a single file of mgmt_cli commands to disable or delete those rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The script is setup to run on the Mgmt station itself and uses the 'mgmt_cli -r true' function and uses the -d DOMAIN flag to support SMS and MDS in a single script&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #24292e; margin-top: 0px !important; margin-bottom: 16px;"&gt;It is highly recommended to run the 'DISABLE' version prior to running a 'DELETE' it will treat it as a staging for full deletion&lt;/P&gt;&lt;H2 style="color: #24292e; border-bottom: 1px solid #eaecef; font-weight: 600; font-size: 1.5em; margin-top: 24px; margin-bottom: 16px; padding-bottom: 0.3em;"&gt;How to Use&lt;/H2&gt;&lt;UL style="color: #24292e; margin-bottom: 16px; padding-left: 2em;"&gt;&lt;LI&gt;Move script to the management station&lt;/LI&gt;&lt;LI style="margin-top: 0.25em;"&gt;./cleanup-zero-hits.sh&lt;/LI&gt;&lt;LI style="margin-top: 0.25em;"&gt;Enter IP address of SMS or CMA you wish to check&lt;/LI&gt;&lt;LI style="margin-top: 0.25em;"&gt;Follow remaining prompts for options&lt;UL style="padding-left: 2em;"&gt;&lt;LI&gt;uid or name&lt;UL style="padding-left: 2em;"&gt;&lt;LI&gt;The script will ask if you want to export with uid or name. UID is more accurate as it does not change with position. This will prevent a situation where another admin is adding/removing rules from the rulebase before you are able to run the output file.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="color: #24292e; margin-bottom: 16px;"&gt;You can take the delete/disable command file and run it.&lt;/P&gt;&lt;UL style="color: #24292e; margin-bottom: 0px !important; padding-left: 2em;"&gt;&lt;LI&gt;chmod 755 Output-Filename.txt&lt;/LI&gt;&lt;LI style="margin-top: 0.25em;"&gt;./Output-Filename.txt&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original files on github:&amp;nbsp;&lt;A class="link-titled" href="https://github.com/cpmidsouth/Delete-or-Disable-Zero-Hit-Rules" title="https://github.com/cpmidsouth/Delete-or-Disable-Zero-Hit-Rules"&gt;GitHub - cpmidsouth/Delete-or-Disable-Zero-Hit-Rules: This script is designed to search a specifed rule base with ZERO h…&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: If you use inline layers within the rulebase&amp;nbsp;you will need to search those as a separate&amp;nbsp;layer. This script is not effective in a rulebase&amp;nbsp;where multiple targets within the same rulebase. I am working on that one. Thanks to &lt;A href="https://community.checkpoint.com/migrated-users/50398"&gt;Vincent Bacher&lt;/A&gt;‌ for being my QA and spending way too much time testing with me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feedback welcome this was a simple project that came out of a client request.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2018 16:48:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40005#M2562</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-02-17T16:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40006#M2563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very nice, and from field knowledge I know it's useful&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I like how outside of input/output text it's essentially one line of code.&amp;nbsp;So that's kind of pretty on the inside &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few comments in case you are interested..&lt;/P&gt;&lt;P&gt;- The fact that you added "[PolicyName] + Network" means it will only work for Firewall-only users who upgraded their policies. With R80.10, users can create multiple layers in the policy, and then the names of those layers are determined by the users' choice. Also, users with FW+APPI who upgrade their policies will have a policy with 2 ordered layer: "[PolicyName] Network" and "[PolicyName] Applications" (and they can rename those layers as they wish)&lt;/P&gt;&lt;P&gt;- Deleting rules based on their number can be problematic in case someone has just published new rules above them. I'm not sure how common this scenario, but when we designed R80 we had multiple users in mind. So taking the "uid" of the rule rather than "rule-number" is safer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Feb 2018 06:31:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40006#M2563</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-02-18T06:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40007#M2564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tomer thanks for the input. I did write it specifically for an account that had upgraded, I didn't take into account the creation of policies in 80.10. I will work on that specific for the next version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree on the safeness of UID, I chose rule number as a way for the customer to manually review before letting the API do the deleting, call it controlled paranoia. But I did tweak a couple things this morning to use UID tested it and it works just fine, I think I will upload that as a second option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;mgmt_cli -r true show access-rulebase name "$POL_NAME Network" details-level "standard" use-object-dictionary true show-hits true --format json | jq --raw-output --arg RBN "$POL_NAME" '.rulebase[] | select(.hits.value == 0) | ("mgmt_cli -r true delete access-rule uid " + (.uid|tostring) + " layer")' &amp;gt; $POL_NAME-tmp.txt; sed "s,$, '$POL_NAME Network'," $POL_NAME-tmp.txt &amp;gt; $POL_NAME-delete-unused-uid.txt; rm *tmp.txt&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Feb 2018 14:52:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40007#M2564</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-02-18T14:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40008#M2565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome. Also I'm glad that you managed to workaround a customer's request by yourself. Imagine what you had to do if we didn't have&amp;nbsp;this &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Feb 2018 15:17:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40008#M2565</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-02-18T15:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40009#M2566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tomer, I've now updated it to list out the Access Layers and allow the users to pick instead of just assuming the addition of Network. This should allow it to work for all packages upgraded or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2018 13:59:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40009#M2566</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-03-23T13:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40010#M2567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great job!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Mar 2018 10:21:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40010#M2567</guid>
      <dc:creator>Jill_Sanders</dc:creator>
      <dc:date>2018-03-25T10:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40011#M2568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;nice useful script, good job.&lt;/P&gt;&lt;P&gt;One question:&lt;/P&gt;&lt;P&gt;I have just tested the script but unfortunately get no result, that means the utput file is empty.&lt;/P&gt;&lt;P&gt;Started the script:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;./delete-zero-hits-rulenumber-v3.sh&lt;BR /&gt;This script will search a specific policy package for rules with a ZERO hit count.&lt;BR /&gt;Use with caution for deleting rules..&lt;BR /&gt;If for any reason you make a typo and need to exit use CTRL+C.&lt;BR /&gt;Press ENTER&amp;nbsp; to continue&lt;BR /&gt;Listing Access Policy Package Names.&lt;BR /&gt;Applications&lt;BR /&gt;************-FW-POLICY Network&lt;BR /&gt;What is the Policy Package Name?&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried the policy Name with or without "Network"&lt;/P&gt;&lt;P&gt;************-FW-POLICY Network&lt;/P&gt;&lt;P&gt;************-FW-POLICY&lt;/P&gt;&lt;P&gt;With or without quotation marks. Output file is always empty. Hopefully i find some time to have a look into the script and at the mgmt_cli commands.&lt;BR /&gt;Cheers&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 06:56:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40011#M2568</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-05-28T06:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40012#M2569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting Vincent. Is it possible you don't have rules with a zero hit count? This is tested on 80.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to have you run the raw command to look for the output;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mgmt_cli -r true show access-rulebase name "&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;************-FW-POLICY Network&lt;/SPAN&gt;" details-level "standard" use-object-dictionary true show-hits true --format json | jq --raw-output '.rulebase[] | select(.hits.value == 0)'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See what that outputs. If it's nothing then run this;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;mgmt_cli -r true show access-rulebase name "&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;************-FW-POLICY Network&lt;/SPAN&gt;&lt;SPAN&gt;" details-level "standard" use-object-dictionary true show-hits true --format json | jq --raw-output '.rulebase[]'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Then look for the output of each rule and the hits value;&amp;nbsp; which should look like the below (I formatted the text you would look for)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt; &lt;/SPAN&gt;&lt;SPAN class=""&gt;"rule-number"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;1&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"track"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"type"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"598ead32-aa42-4615-90ed-f51a5928d41d"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"per-session"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"per-connection"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;true&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"accounting"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"alert"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"none"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"source"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;],&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"source-negate"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"destination"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;],&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"destination-negate"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"service"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"97aeb470-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;],&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"service-negate"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"vpn"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;],&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"action"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"6c488338-8eec-4103-ad21-cd461ac2c472"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"action-settings"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"enable-identity-captive-portal"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"content"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;],&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"content-negate"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;false&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"content-direction"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"any"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"time"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"97aeb369-9aea-11d5-bd16-0090272ccb30"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;],&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;"hits"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"percentage"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"1%"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"level"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"low"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"value"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;24946&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"first-date"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"posix"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;1518945364000&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="font-family: impact, sans-serif;"&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"iso-8601"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"2018-02-18T03:16-0600"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"last-date"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"posix"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;1527527490000&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"iso-8601"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"2018-05-28T12:11-0500"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"custom-fields"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"field-1"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;""&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"field-2"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;""&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"field-3"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;""&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"meta-info"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"lock"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"unlocked"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"validation-state"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"ok"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"last-modify-time"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"posix"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;1497028032827&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"iso-8601"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"2017-06-09T12:07-0500"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"last-modifier"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"admin"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"creation-time"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"posix"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;1497028010878&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"iso-8601"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"2017-06-09T12:06-0500"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"creator"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"admin"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"comments"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;""&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"enabled"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;true&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"install-on"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: [&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"6c488338-8eec-4103-ad21-cd461ac2c476"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;]&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;}&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;{&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"uid"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"b11cd15c-f55b-4450-8f96-09ccda45f1bc"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"type"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"access-rule"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"domain"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: {&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"uid"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"41e821a0-3720-11e3-aa6e-0800200c9fde"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"name"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"SMC User"&lt;/SPAN&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;"domain-type"&lt;/SPAN&gt;&lt;SPAN class=""&gt;: &lt;/SPAN&gt;&lt;SPAN class=""&gt;"domain"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;},&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 17:24:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40012#M2569</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-05-28T17:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40013#M2570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&amp;nbsp;&lt;/P&gt;&lt;P&gt;in fact I have rules with zero hitcount. Did not have time yet to try running the raw commands, will do that tomorrow.&lt;/P&gt;&lt;P&gt;Cheers&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vincent&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 20:16:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40013#M2570</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-05-28T20:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40014#M2571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds good. I’ll be interested to see. I’m going to send you my check Point email as well so we can work offline and report back&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 22:51:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40014#M2571</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-05-28T22:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40015#M2572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had another thought... run the UID version of the script and check it’s output as well.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2018 22:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40015#M2572</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-05-28T22:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40016#M2573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did not receive your mail &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just ran the commands you suggested manually:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# mgmt_cli -r true show access-rulebase name "*******-INT-FW-POLICY Network" details-level "standard" use-object-dictionary true show-hits true --format json | jq --raw-output '.rulebase[] | select(.hits.value == 0)'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt; nothing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;running:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mgmt_cli -r true show access-rulebase name "********-INT-FW-POLICY Network" details-level "standard" use-object-dictionary true show-hits true --format json | jq --raw-output '.rulebase[]'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shows a list of round about 50 no-hits rules. Should be correct amount.&lt;/P&gt;&lt;P&gt;So question is why select(.hits.value == 0)' has no match &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2018 06:33:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40016#M2573</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-05-29T06:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40017#M2574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Empty as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2018 09:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40017#M2574</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-05-29T09:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40018#M2575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wanted to drop a note here as well for anyone following along. Vincent's testing helped me determine a few things that I did not test in my lab;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. The original script was not setup to handle section title headers. *RESOLVED*&lt;/P&gt;&lt;P&gt;2. I was unaware of a the default limit of "50" being used. This was causing the script to only search the first 50 rules of a rulebase. This was not an issue in my lab as I was only testing with 25. I've since expanded the script to determine the rule count and to loop until it searches all rules. *RESOLVED*&lt;/P&gt;&lt;P&gt;3. The script does not take into account a rulebase&amp;nbsp;that has multiple targets in it. *WORKING TOWARDS RESOLUTION*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/6703"&gt;Tomer Sole&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 16:48:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40018#M2575</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-05-30T16:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40019#M2576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you&amp;nbsp;want to be extra awesome you can try multi-domain policies...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2018 22:34:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40019#M2576</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2018-05-30T22:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40020#M2577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Like this?&amp;nbsp;&lt;A href="https://community.checkpoint.com/docs/DOC-2813" target="_blank"&gt;https://community.checkpoint.com/docs/DOC-2813&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now im still working on updating that one to take the limit into account. Should be done tonight or tomorrow.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:24:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40020#M2577</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2019-06-21T09:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40021#M2578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;please take a look at our Management API Python SDK on GitHub -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/CheckPointSW/cp_mgmt_api_python_sdk/blob/master/lib/mgmt_api.py"&gt;https://github.com/CheckPointSW/cp_mgmt_api_python_sdk/blob/master/lib/mgmt_api.py&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and go the the method called "api_query" on line 318.&lt;/P&gt;&lt;P&gt;this method shows how to query ALL objects, bypassing 50 objects limit.&lt;/P&gt;&lt;P&gt;Robert.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2018 07:57:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40021#M2578</guid>
      <dc:creator>Robert_Decker</dc:creator>
      <dc:date>2018-05-31T07:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40022#M2579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Its possible change the action of this script from DELETE HitCount zero Rule to DISABLE RULE ? And Put one comment to identification of rule after script execution ?&lt;/P&gt;&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2018 03:04:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40022#M2579</guid>
      <dc:creator>Luciano_Miguel</dc:creator>
      <dc:date>2018-06-03T03:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40023#M2580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Robert. I’ll be honest I do t speak python all that well, I’m an old basher. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; but I do need to expand and learn it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to achieve the limit in bash by doing a total then setting my limit to 500 but looping the offset in a seq with it incrementing by 500 until it hits $total.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2018 19:14:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40023#M2580</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-06-03T19:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: Disable/Delete Rules with a Zero Hit Count (MDS or SMS)</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40024#M2581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/46498"&gt;Luciano Miguel&lt;/A&gt;‌ sure can. Sorry for posting it here fully but I’m traveling and did this from my cell phone and couldn’t upload a file. Was able to test on my sms and confirmed it worked out just fine. Just copy and paste the below. It will make it where you can disable the rules and adds a Comment that says “disabled by API Zero Hits&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;today="$(date +%Y-%m-%d)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;from="$(date --date="6 months ago" +%Y-%m-%d)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;timestamp="$(date +%Y-%m-%d-%H-%M-%S)"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;"This script will search a specific policy package for rules with a ZERO hit count.\nUse with caution for deleting rules..\nIf for any reason you make a typo and need to exit use CTRL+C.\nPress ENTER&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;to continue"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;read ANYKEY&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nListing Access Policy Package Names\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;mgmt_cli -r true show access-layers limit 500 --format json | jq --raw-output '."access-layers"[] | (.name)'&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nWhat is the Policy Package Name?\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;read POL_NAME&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;POL2=$(echo $POL_NAME | tr -d ' ')&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nDetermining Rulesbase Size\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;total=$(mgmt_cli -r true show access-rulebase name "$POL_NAME" --format json |jq '.total')&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "There are $total rules in $POL_NAME\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nDoes Your Policy Contain Section Title Headers?[y/n]\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;read SECHEAD&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;if [ "$SECHEAD" = "y" ]; then&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nCreating Deletion Scripts. This may take a minute depending on Rulebase size.\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;for I in $(seq 0 500 $total)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;do&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;mgmt_cli -r true show access-rulebase name "$POL_NAME" details-level "standard" offset $I limit 500 use-object-dictionary true show-hits true hits-settings.from-date $from hits-settings.to-date $today --format json | jq --raw-output --arg RBN "$POL_NAME" '.rulebase[] | .rulebase[] | select(.hits.value == 0) | ("mgmt_cli -r true set access-rule uid&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;" + (.uid|tostring) + " enabled false layer")' &amp;gt;&amp;gt; $POL2-tmp.txt&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;done&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;elif [ "$SECHEAD" = "n" ]; then&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nCreating Deletion Scripts. This may take a minute depending on Rulebase size.\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;for I in $(seq 0 500 $total)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;do&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;mgmt_cli -r true show access-rulebase name "$POL_NAME" details-level "standard" offset $I limit 500 use-object-dictionary true show-hits true hits-settings.from-date $from hits-settings.to-date $today --format json | jq --raw-output --arg RBN "$POL_NAME" '.rulebase[] | select(.hits.value == 0) | ("mgmt_cli -r true set access-rule uid " + (.uid|tostring) + " enabled false layer")' &amp;gt;&amp;gt; $POL2-tmp.txt&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;done&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;fi&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;sed "s,$, '$POL_NAME' comments ‘disabled by API Zero Hit’," $POL2-tmp.txt &amp;gt; $POL2-delete-unused.txt; rm *tmp.txt&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;/P&gt;&lt;P style="color: #454545; margin: 0.0px 0.0px 0.0px 0.0px;"&gt;&lt;SPAN style="font-size: 17.00pt;"&gt;printf "\nDelete commands for zero hit count rules are now located in $POL2-delete-unused.txt\n"&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jun 2018 19:46:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Disable-Delete-Rules-with-a-Zero-Hit-Count-MDS-or-SMS/m-p/40024#M2581</guid>
      <dc:creator>Adam_Forester</dc:creator>
      <dc:date>2018-06-03T19:46:48Z</dc:date>
    </item>
  </channel>
</rss>

