Graphical Data Representation; Integration With Logs; Central Access To Management Information - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Graphical Data Representation

Integration with Logs

Central Access to Management Information

784
FW/VPN—Reports that summarize log and alarm data generated by the managed
security devices in your network.
DI/IDP—Reports that provide data on deep inspection (DI) and intrusion detection and
prevention (IDP) attacks.
Screen—Reports that provide data on Screen attacks detected by the firmware on the
managed security devices in your network.
Administrative—Reports specifically designed to help system administrators track and
manage log incidents and security rules.
UAC Reports—Reports that provide data on Unified Access Control (UAC) sessions.
Profiler Reports—Reports that help system administrators investigate and analyze
potential problems in the network and to resolve security incidents.
AVT—Reports that help system administrators track the volume of application traffic
in the managed network.
EX Switch Report—A report that provides configuration data on EX Series switches.
My Reports—All reports that you have saved or created as custom reports.
SSL/VPN Reports—Reports that provide data on Infranet Controller.
Shared Reports—All reports that you have saved or created that you want made
accessible to others in a domain.
Grouping these reports by type enables administrators and operations staff interested
in tracking and analyzing specific types of information to work only within the group of
reports that they need.
For details on each of the specific reports per group, see "Report Types" on page 785. For
additional details on each report type group, refer to the Network and Security Manager
Online Help.
You can use reports to view log data in both tabular and graphical form. The various
depictions of the data make it easier to identify trends and potential areas of risk. You
can also choose to view the data in either a horizontal bar graph or a pie chart.
Reports are also integrated with the Log Viewer and Log Investigator modules. By clicking
a data point depicted in a report, you can quickly drill down to access and view the specific
log entries presented in the report data. Refer to "Log Viewer Integration" on page 798 for
more information about how you can use reports and log entries together to further
analyze network events and attacks.
For network administrators and security analysts interested in tracking and identifying
potential network trends and attacks, Report Manager provides a single graphical view
into the network.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents