Rampart Features

Rampart combines multiple layers of firewall analysis to provide a complete security review in a single pass.

Firewall Policy Analysis

Understand the structure and behaviour of complex rulebases.

Security Policy Browser

Full searchable, filterable table of all security rules showing zones, addresses, applications, services, actions, and security profiles.

High Risk Rule Detection

Automatically flags rules using "any" for source or destination, rules missing security profiles, and rules without audit descriptions.

Shadowed Rule Detection

Identifies rules completely shadowed by earlier entries that will never be matched, with specific options for remediation.

Stale Rule Detection

Flags rules with outdated naming conventions, descriptions suggesting decommission, and references to objects that no longer exist in the configuration.

Rule Expiry & Temporal Analysis

Detects rules with expired schedules still active and flags likely-temporary rules (test, hotfix, ticket references) that have no expiry set.

Rule Optimisation

Recommends consolidating multiple inline services or addresses into reusable groups for easier management and auditing.

Exposure & Attack Surface

Visualise how network zones interact and identify unintended exposure.

Attack Surface Analysis

Generates a Zone Exposure Matrix showing every permitted inter-zone traffic path to reveal unintended exposure.

Lateral Movement Risk Analysis

Analyses east-west traffic paths between internal zones. Flags rules that allow broad cross-zone access with wide port ranges, which are common pivot points during an attack.

Segmentation Effectiveness Score

Evaluates how well zones are actually segmented by scoring the ratio of allowed vs blocked inter-zone flows. Identifies cosmetic segmentation where most zones can communicate freely.

Cleartext Protocol Exposure

Identifies rules allowing unencrypted protocols (HTTP, FTP, Telnet, SNMP, LDAP, and more) across zone boundaries, with severity elevated for internet-facing rules.

Geo-IP & Sanctions Exposure

Flags internet-facing rules with unrestricted source addressing that lack geographic restrictions, creating compliance risk with OFAC, EU, and UN sanctions frameworks.

Management Interface Security

Audits interface management profiles for insecure protocols (HTTP, Telnet, SNMP) exposed on data-plane interfaces.

Application-Aware Analysis

Deep inspection powered by App-ID behaviour and application-default port resolution.

Traffic Flow Simulator

Simulate any traffic scenario by source/destination IP, zone, port, protocol, and application to determine which rule would match β€” without touching the live firewall.

Egress Filtering Analysis

Analyses outbound rules for data exfiltration risk β€” unrestricted outbound to internet, DNS exfiltration vectors, common C2 ports, and missing outbound security profiles.

Decryption Policy Gap Analysis

Identifies traffic flows that bypass SSL/TLS decryption. Reports coverage percentage, no-decrypt exclusions, and security rules with no matching decryption rule.

FQDN DNS Resolution

Tests all FQDN-based address objects against live DNS to surface stale or unresolvable entries before they cause policy gaps.

Palo Alto Best Practices Score

Rates App-ID enablement, logging configuration, and policy structure against Palo Alto Networks' official best practice guidelines.

Compliance & Reporting

Validate against industry frameworks and produce professional audit deliverables.

Regulatory Compliance Scoring

Scores your configuration against NIST, ISO 27001, SOX, GDPR, HIPAA, CIS Benchmarks, PCI-DSS, and APRA CPS 234 with per-control pass/fail detail.

Rampart Risk Rating

Composite security score (0–100) combining Best Practices (40%), Segmentation Effectiveness (30%), and Severity Penalty (30%) into a single A–F grade for executive reporting.

PDF & JSON Export

Generate professional audit reports with executive summary, risk rating, detailed findings, compliance results, and remediation recommendations.

Word Report Generation

Generate customizable Word reports using your own branded .docx templates with automatic placeholder replacement. Requires Windows and Microsoft Word.

Configuration Hygiene

Identify redundant, unused, and misconfigured objects for cleaner policy management.

Duplicate Object Detection

Finds duplicate address objects referencing the same IP/subnet and highlights unreferenced objects safe for removal.

Object Cross-Reference

Maps every address and service object to its rule usage count, exposing unused objects and over-referenced entries.

Audit Summary Dashboard

At-a-glance view of risk rating, total rules, and issues broken down by severity with key security metrics.

Consultant Tools

Multi-client management and cross-audit tracking for security consultants.

Client & Project Management

Organise audits by client and project. Assign configurations, track audit history, and manage multiple engagements from a single interface.

Security Findings Tracker

Track remediation progress across audits. Save baselines, compare snapshots, and see which findings are resolved, still open, or newly introduced.

Remediation Progress Reporting

PDF reports automatically include remediation progress when a project baseline exists, showing resolved, open, and new findings with visual breakdown.

Strata Cloud Manager Integration

Connect directly to Palo Alto Strata Cloud Manager via API to fetch firewall configurations for analysis β€” no manual exports required.