Viewing Nsm Predefined Reports - Juniper NETWORK AND SECURITY MANAGER 2010.3 - CONFIGURING INTRUSION DETECTION AND PREVENTION GUIDE REV1 Manual

Configuring intrusion detection and prevention devices guide
Table of Contents

Advertisement

Related Topics

Viewing NSM Predefined Reports

Table 61: NSM DI/IDP Predefined Reports
Report
Top 100 Attacks (last 24 hours)
Top 100 Attacks Prevented (last 24 hours)
Top 20 Attackers (All Attacks - last 24
hours)
Top 20 Attackers Prevented (All Attacks -
last 24 hours)
Top 20 Targets (last 24 hours)
Top 20 Targets Prevented (last 24 hours)
All Attacks by Severity (last 24 hours)
Copyright © 2010, Juniper Networks, Inc.
Table 60: Device Status Information (continued)
Column
Description
License Inventory
Displays the inventory status for software on the device:
Status
In Sync—The inventory information in the NSM database is synchronized
with the licenses on the device.
Out Of Sync—The inventory information in the NSM database is not
synchronized with the licenses on the device.
N/A—The connected device is a ScreenOS or IDP device, or the device is
not connected and imported.
First Connect
The first time the security device connected to the NSM device server.
Latest Connect
The last time the security device connected to the NSM device server.
Latest Disconnect
The last time the security device disconnected from the NSM device server.
Creating NSM Custom Reports on page 135
NSM Logs and Reports Overview on page 127
You can use the predefined reports to validate the effectiveness of your security policies.
Table 61 on page 133 describes NSM DI/IDP predefined reports. These reports are related
to attacks.
Description
Those attacks that are detected most frequently within the last 24 hours.
Those attacks that are prevented most frequently within the last 24 hours.
IP addresses that have most frequently been the source of an attack during the
last 24 hours.
IP addresses that have most frequently been prevented from attacking the network
during the last 24 hours.
IP addresses that have most frequently been the target of an attack during the
last 24 hours.
IP addresses that have most frequently prevented attacks during the last 24 hours.
Number of attacks by severity level (set in attack objects).
Chapter 12: Working with NSM Logs and Reports
133

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents