You can find out which entities and access points are affected by a given access rule, using the Access rule configuration report.
What you should know
For information about modifying the members of an access rule, see the Security Center Administrator Guide.