Eliminate vulnerabilities with firewall rules best practice
Learn how to leverage rule usage analysis flow to create a firewall rule base from scratch to deliver a superior firewall change management process.
In this webinar, you’ll learn how to:
- Configure and use the new Rule Usage Analysis Flow feature to create a firewall rule base from scratch.
- Import RUA Flow results into Change Manager starting from csv files.
- Evaluate the risk introduced by new rules.
- Fix firewall policy violations.
- Provision new rules to the firewall.
Many organizations are deploying new firewalls at branch offices and industrial sites to enhance their network segmentation. Still, they struggle to create firewall rule bases due to a lack of knowledge and documentation about the actual network flows between their devices and applications.
During this session, you’ll learn how to create a firewall rule base from scratch, import the results of rule usage analysis flow into Skybox Change Manager, and provision the new firewall rule base to a firewall for accurate firewall rule lifecycle management.