Analyzing Relationships - Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Permissions

Analyzing Relationships

Copyright © 2010, Juniper Networks, Inc.
From the Log Viewer, for any anomaly, signature or custom log, right-click on a
Source/Destination Address, Protocol/Destination Port, or NAT Source/Destination
Address and select Launch Security Explorer.
NOTE: For all other log categories, the Launch Security Explorer option is not available.
From the Profiler, right-click on a Source/Destination Address, Context , Service,
Subcategory, or Time Received in any entry and select Launch Security Explorer.
If you launch Security Explorer from the Security Monitor without any reference point,
the main graph appears empty.
If you launch Security Explorer using a starting point of reference from the Log Viewer or
the Profiler, that reference point is depicted in the main graph.
To use the Security Explorer, you must have the proper administrative privileges including
the View Security Explorer activity. By default, all IDP administrators have this privilege.
Depending on other activities you may want to use with Security Explorer, you also may
need proper administrative privileges to:
View Profiler
View Device Logs
View Historical Log Reports
View Devices
View Shared Objects
If you do not have proper permission to perform all activities, you may only have access
to a reduced set of Security Explorer features. For example, if you do not have View
Profiler privileges, you cannot view graphs related to the Profiler, for example, Peer graph.
If an administrator is logged into the global domain, all devices in the address point of
reference list appear. This includes all global and subdomain objects. If an administrator
is logged into a subdomain, only those devices in the current subdomain devices appear.
After you have established your main point of reference, a list of navigation options
appears. Every option represents a transition from one graph to another.
Viewing Data
The following view options are available, making it easier for you to view and analyze
each node in the main graph:
Chapter 18: Analyzing Your Network
725

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents