Table 111: Administrative Reports; Table 112: Uac Reports - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide
788
Table 110: Screen Reports (continued)
Report
Description
Screen Attacks over
A summary of when attacks are detected by the firmware on your security
Time
device
Top Screen
Where attacks originate from most frequently
Attackers
Top Screen Targets
Which hosts on your network are the most frequent targets of attackers
for firewall attacks
Administrative Reports
Table 111 on page 788 lists and describes reports in NSM that provide information specifically
for administrators.

Table 111: Administrative Reports

Report
Description
Logs by User-set Flag
The total number of log entries that were flagged by an administrator in
the Log Viewer according to the predefined flag type set. You can flag
log events as High, Medium, Low, Closed, False Positive, Assigned,
Investigate, Follow-Up, or Pending. You can use the Logs by User-set
Flag report to quickly identify log events of specific interest.
Top FW/VPN Rules
The total number of log entries generated by specific rules in your
ScreenOS/DI policies. You can use the Top Rules report to identify those
rules that are generating the most log events. This enables you to better
optimize your rulebases by identifying those rules that are most and least
effective. You can then modify or remove those rules from your security
policies.
UAC Reports
Table 112 on page 788 lists and describes those reports in NSM that provide information
about Unified Access Control (UAC) session logs.

Table 112: UAC Reports

Report
Description
Time graph of UAC
Total number of UAC session logs over the last 7 days.
session logs
Top 20 Destinations
20 destination IP addresses that have most frequently appeared on UAC
logs over the last 7 days.
Top 20 Enforcers
20 Infranet enforcer devices that have most frequently appeared on UAC
(devices) for UAC logs
logs over the last 7 days.
Top 10 auth failures for
Ten user authentication failures that have mostly frequently appeared
user@realm
on UAC logs over the last 24 hours.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents