Working With Nsm Logs And Reports; Nsm Logs And Reports Overview; Viewing Logs - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

CHAPTER 12

Working with NSM Logs and Reports

NSM Logs and Reports Overview

Related Topics

Viewing Logs

Copyright © 2010, Juniper Networks, Inc.
NSM Logs and Reports Overview on page 127
Viewing Logs on page 127
Viewing Device Status on page 130
Viewing NSM Predefined Reports on page 133
Creating NSM Custom Reports on page 135
Configuring Log Suppression on page 137
IDP devices generate logs about device status based on built-in criteria and about security
events based on the security policy notification settings. These logs are automatically
sent to the NSM GUI server and can be viewed in the NSM log viewer.
IDP administration includes the following log-related tasks:
Viewing device status, logs, and reports
Configuring log suppression, if you want to reduce the number of identical log files
Viewing Logs on page 127
Configuring Syslog Collection (NSM Procedure) on page 80
NSM logging tools provide a high-level view of the activity on your network, enabling you
to view summaries as well as detailed information. You can choose to view log entries
for an event that occurs across domains. This section includes the following primary
sections:
1. IDP Logs on page 128
2. Using NSM Log Investigator on page 128
3. Using NSM Audit Log Viewer on page 128
127

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents