Identifying Security Monitoring Devices And Flow Data Sources | 97; Identifying Network Assets - Juniper JSA7500 Secure Analytics Hardware Manual

Hide thumbs Also See for JSA7500:
Table of Contents

Advertisement

• NTP server (Console only) or Time server
RELATED DOCUMENTATION
JSA Components | 71
Browser Support | 73
Preparing the Network Hierarchy | 73

Identifying Security Monitoring Devices and Flow Data Sources | 97

Identifying Network Assets | 97

Identifying Security Monitoring Devices and Flow Data Sources
Juniper Secure Analytics (JSA) can collect and correlate events received from external sources such as
security equipment (for example, firewalls, VPNs, or IDSs) and host or application security logs, such as
Windows logs. Device Support Modules (DSMs) and Flow Collectors allow you to integrate JSA with this
external data. JSA automatically discovers sensor devices that are sending system log (syslog) messages
to an Event Collector. The sensor devices that are automatically discovered by JSA appear in the Sensor
Devices window within the JSA Administration Console. Once autodiscovery is completed, you should
disable the Auto Detection Enabled option in the Event Collector configuration. For more information,
Administration Guide and Log Sources Users Guide .
see the
RELATED DOCUMENTATION
JSA Components | 71
Browser Support | 73
Preparing the Network Hierarchy | 73
Identifying Network Settings | 96
Identifying Network Assets | 97
Identifying Network Assets
Juniper Secure Analytics (JSA) can learn about your network and server infrastructure based on flow
data. The Server Discovery function uses the JSA Asset Profile database to discover many types of
servers.
97

Advertisement

Table of Contents
loading

This manual is also suitable for:

Jsa3800Jsa5800Jsa7800

Table of Contents