Avoid using the All selection for the source and destination addresses. Use addresses or address groups. It is possible to use security policies based on 'any' interface. However, for better granularity and stricter security, explicit interfaces are recommended. Automatic processes deployed and orchestrated from ATAR, and enforcement, and detection from https://franciscobioty.gigswiki.com/4475200/neue_schritt_für_schritt_karte_für_fortigate