Configuring Tracking Options in Security Policies

Logs are useful if they show the traffic patterns you are interested in. Make sure your Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. tracks all necessary rules. When you track multiple rules, the log file is large and requires more disk space and management operations.

To balance these requirements, track rules that can help you improve your cyber security, help you understand of user behavior, and are useful in reports.

To configure tracking in a rule:

  1. Right-click in the Track column.

  2. Select a tracking option.

  3. Install the policy.

Available Tracking Options

These are the available tracking options in the Track column: