Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual page 145

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Table 57: NSM Audit Log Viewer Table (continued)
Column
Description
Admin Name
The name of the NSM administrator who changed the object.
Admin Login
The name of the domain (global or subdomain) that contains the changed object.
Domain
Authorization
The final access-control status of activities is either success or failure.
Status
Command
The command applied to the object or system, for example, sys_logout or modify.
Targets
For changes made to a device configuration or object, the Audit Log Viewer displays the object type, an
object name, and object domain.
Devices
For changes made to a device, the Audit Log Viewer displays the device name, object type, and device
domain.
For changes made to the management system, such as administrator login or logout, the Audit Log Viewer
does not display target or device data.
Miscellaneous
Additional information that is not displayed in other audit log columns.
Table 58: NSM Audit Log Viewer: Target View Table
Column
Description
Target Name
To see additional details for an target view entry, double-click the entry. NSM displays the configuration
screen that the change was made in and marks the changed field with a solid green triangle.
Table
To set the table details for the target view entry, double-click the table. Enter or update the options.
Domain ID
Specifies the domain ID of the target view.
Copyright © 2010, Juniper Networks, Inc.
To display details of a configuration change, such as a changed IP address or renamed
device, select the audit log entry for that change in the Audit Log table and view details
in the Target View table, which appears below the Audit Log Viewer table.
Table 58 on page 129 describes the Target View table.
To display details of a non-configuration event, such as adding the device, auto-detecting
a device, or rebooting a device, select the audit log entry for that change in the Audit Log
table and view details in the Device View table, which is displayed below the Audit Log
Viewer table.
Table 59 on page 130 describes the Device View table.
Chapter 12: Working with NSM Logs and Reports
129

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents