Skip to main content
Question

Real-Time Protection Policy Review

  • November 1, 2024
  • 6 replies
  • 177 views

Our organization must review our policies to determine if the existing policies are still valid and need to be retained.  

Problem we are having is that “allow” rules do not appear to log anywhere.  Short of turning all “allow” rules to be “alert” rules, does anyone have a way to validation if a web access rule is actually being used and needed to be retained?

This topic has been closed for replies.

6 replies

notskope
  • New Member III
  • November 1, 2024

Not that I know of, maybe if you enable webTX and send all transactions to a SIEM you might be able to. Though it’s probably simpler just to set the rules you need to audit to “alert” for a period of time you want to audit.


  • Author
  • New Member
  • November 8, 2024

Support was able to create a report in Advanced Analytics that they are telling me will show the Allow policies that are being hit with traffic.


Kruger
  • New Member III
  • December 19, 2024

Would be interested in seeing how that report was setup as this is a good activity to keep rules cleaned up. 


  • Author
  • New Member
  • December 20, 2024

I think these can be exported and shared.  Would you like a copy?


Kruger
  • New Member III
  • December 23, 2024

Hi. sure.. if you dont mind that would be great. Thank you


Forum|alt.badge.img+16
  • Netskope Employee
  • December 23, 2024

Allow actions are logged in Application Events vs Blocks/Alerts which are logged in both Application Events and Alerts.  So you can get a dashboard created with the following fields:

Policy Name
Action
#Events 

This would give something similar to:
 

 

There’s also measures for Maximum (newest) and Minimum (oldest) Event Date that you can use to see the last time the policy was hit in the specified time filter: