On this page
Security Policy Cleanup
Overview
Improve security and performance by cleaning up shadowed, redundant, and unused rules based on in-depth policy usage insights across hybrid environments.
Security Policy Cleanup guides you through using SecureTrack and SecureChange to:
-
Defining the cleanup scope and reviewing cleanup recommendations across devices.
-
Using dashboards and reports to analyze and validate redundant, unused, and obsolete rules.
-
Using SecureChange workflows to execute rule and object decommission actions.
Why this matters
-
Ensure that security policies remain optimized, lean, and well governed.
-
Reduce operational overhead by minimizing redundant and unnecessary rules.
-
Support compliance and performance objectives through controlled, auditable cleanup activities.
Who this is for
-
Platform administrators responsible for onboarding devices, validating data collection for devices, and maintaining visibility
-
Network and firewall engineers using Rule Viewer and Tufin Query Language (TQL) for rule validation and troubleshooting
-
Compliance analysts responsible for generating and reviewing policy reports for audits
Key capabilities
Security Policy Cleanup leverages key features in SecureTrack and SecureChange for rule and device cleanup:
-
Dashboard to view cleanup recommendations in real time.
-
Cleanup Browser to view policies and rules in which cleanups exist.
-
SecureTrack and STRE reports to identify rules which are candidates for cleanup such as duplicated, unused, and other rules.
-
SecureChange Workflows to decomission and modify servers and rules.
Prerequisites
- SMTP server settings for SecureChange to send notifications
- User accounts if not already defined
- Inbound syslogs with rule and object hit counts
- SecureTrack Reporting Essentials installed and configured to generate required predefined or custom reports
-
Successful completion of:
Step 1: Identify candidates for cleanup
Start by identifying security policy rules and objects that are candidates for cleanup. SecureTrack provides several UI-based options to help you quickly surface unused, risky, or inefficient rules, and to control how cleanup data is calculated and presented.
Use SecureTrack's:
-
Dashboard for high-level cleanup analysis
-
Cleanup Browser to view cleanup candidates by device
Use Dashboard for cleanup recommendations
The SecureTrack Dashboard is the primary, centralized view for identifying cleanup candidates at a high level. It provides immediate insight into where cleanup is needed and how it evolves over time.
The following widgets are especially useful for cleanup analysis:
-
General: Number of rules that require cleanup, rules relevant for audits, and rules with critical violations.
-
Cleanup Trends: Shows rule candidates for cleanup over time, allowing you to identify patterns and track changes across a selected time period.
-
Cleanup - Optimization: Shows rules which are candidates for optimization, which you review and manage in the Rule Viewer.
View cleanup suggestions by device
While the Dashboard provides a high-level overview, the Cleanup Browser lets you drill down into specific devices to see exactly where cleanup candidates exist.
You can:
-
Review cleanup instances by device or device groups
-
Export cleanup instances for the selected device to a CSV file, saved in the Report Repository.
See Cleanup Browser.
Configure Cleanup configuration
SecureTrack includes a predefined set of cleanup types, each with an associated severity level. The Cleanup Browser displays the security score and cleanup instances based on the cleanups selected in the cleanup configuration.
You can:
-
Exclude cleanup types which should affect optimization scores or cleanup calculations.
-
Edit the name, description, and severity of existing cleanups.
Find cleanup candidates in Rule Viewer
Use the Rule Viewer to identify cleanup candidates at the rule level. Search for rules that are disabled, unused, overly permissive, or violating access control policies.
Use:
-
TQL to run precise, query-based searches.
-
AI Assistant Search to quickly surface relevant rule issues using natural language.
See Rule search.
Step 2: Generate reports for cleanup insights
In addition to UI-based options, you can generate reports to analyze cleanup candidates in depth and share findings with stakeholders.
SecureTrack reporting helps you review cleanup data offline, track trends, and support data-driven cleanup decisions.
STRE Rule Analytics report
The Rule Analytics report is useful for cleanup analysis. It uses the same search logic as the Rule Viewer, allowing you to scale your analysis beyond the UI.
You can generate a Rule Analytics report using the same search criteria you use in the Rule Viewer:
-
Copy a TQL query—for example, to find disabled or highly permissive rules—and paste it into the report’s Search field.
-
Select the device for which to display rules and rule KPIs.
Go to SecureTrack > Reports > Reporting Essentials .
See STRE Rule Analytics report.
SecureTrack Rule and Object Usage report
To gain deeper visibility into unused objects and inactive rules before taking cleanup actions, generate the Rule and Object Usage report.
See:
Creating/Generating a Rule and Object Usage Report
STRE Security Compliance and Security Violation reports
Use STRE Compliance and Violation reports to prioritize cleanup efforts and rule remediation based on policy risk.
-
Security Compliance
The Security Compliance report lists all the security requests required to comply with SecureTrack Unified Security Polices (USPs) and indicates whether device rules meet those requirements.
You can:
-
Identify rules that are in violation with your USPs
-
Prioritize remediation efforts
-
-
Security Violations
The Security Violations report provides a detailed summary of security policy violations across the selected domain, devices, and USPs.
You can:
-
Identify security gaps
-
Prioritize rules for remediation, removal or exception review
-
Ensure consistent awareness of violations by the relevant team
-
See:
STRE Security Compliance report
STRE Security Violations report
Step 3: Automate Cleanup with SecureChange workflows
Use SecureChange workflows to automate and govern the removal of unused objects and obsolete rules. This step moves cleanup from analysis to execution, ensuring that all changes follow controlled, auditable processes.
Create Network Object Decommission workflow
Configure the Network Object Decommission workflow in SecureChange to safely remove unused network objects. The Decommission network object field in one or more workflow steps lets you manage the process of removing the network objects from the firewalls.
This workflow allows you to:
-
Submit decommission requests for unused or obsolete objects.
-
Validate dependencies before removal.
-
Ensure object cleanup follows an approved and auditable process.
See Decommission Network Object Field.
Submit object decommission requests
After configuring the Network Object Decommission workflow, submit decommission requests for unused objects identified during cleanup analysis.
This step ensures that:
-
Cleanup actions rely on verified usage data.
-
Object removal is tracked and approved through SecureChange.
Create Rule Decommission workflow
Configure a Rule Decommission workflow to support the structured removal of obsolete, unused, or policy-violating rules. The Rule decommission field in a workflow step manages the removal of selected rules from supported devices.
This workflow allows you to:
-
Enforce approval and validation steps before removing a rule.
-
Standardize how rule cleanup requests are reviewed and executed.
-
Reduce risk associated with manual rule deletions.
Submit Rule Decommission requests
Initiate Rule Decommission tickets directly from the Rule Viewer.
Submitting requests from the Rule Viewer:
-
Links analysis directly to action.
-
Reduces manual effort and context switching.
-
Accelerates rule cleanup while maintaining governance and auditability.
Was this helpful?
Thank you!
We’d love your feedback
We really appreciate your feedback
Send this page to a colleague