Managing Access Control Policies

You can edit system-provided access control policies and create custom access control policies.

Procedure


Step 1

Choose Policies > Access Control heading > Access Control.

At the top of the page, there are convenient links to some related features: Object management, Intrusion policies, Network Analysis policies, DNS policies, and policy Import/Export.

Step 2

Manage access control policies:

  • Create—Click New PolicyNew Policy; see Creating a Basic Access Control Policy.

  • Inheritance—Click Plus next to a policy with descendants to expand your view of the policy's hierarchy.

  • Edit—Click Edit (edit icon); see Editing an Access Control Policy

  • Delete—Click Delete (delete icon). You must remove any device assignments before deleting a policy.

  • Copy—Click Copy (copy icon). Device assignments are not retained in the copy.

  • Report—Click Report (Report icon).. The report is generated as a background process. Go to the message/notifications center and look in the Tasks list. When the report is finished, you can download it from the notification.

  • Lock or unlock a policy—See Locking an Access Control Policy.