Configuring Report Source Data
Configuring a Report Time Period
Configuring the Data Point Count
Configuring the Chart Type
Sharing Your Custom Report
Modifying Report Filters
Copyright © 2010, Juniper Networks, Inc.
You can configure a report to one of the following log record columns: Action, Alert, Src
Addr, or Policy. Select the report source data by checking the appropriate check boxes
in the Columns For Report selection area. The data that you choose for the columns in
your report appear in the Y-axis of the graph.
You can configure a report to display all available data from either a specific date and
time or during a specific time interval.
For example, if you suspect that your network was attacked on September 15 at 6:00
PM, you could set the Starting At Time Period Duration report field in the options on a
Top Screen Attacks report to that time, then generate the report.
If you are not sure of the exact date or time of the attack, but know it occurred during the
past 2 days, set the Duration field in the Time Period Duration report options on a Top
Screen Attacks report to two days, then generate the report.
NOTE: The data that you can display in each report is limited by the amount of log
information available.
Typically, the top 50 occurrences of each data type are displayed in each report. You can
configure a report to display more or fewer data points depending upon the level of detail
you need. For example, if you want to obtain a more precise view of the top occurrences
of events, you would configure a lower data point count (such as 25).
NOTE: The minimum data point count that you can configure in all reports is 5; the
maximum data point count is 200.
By default, each report depicts information in a horizontal bar chart. You can also configure
the report to depict information using a pie chart.
Use the Save Report In pull-down menu and select the Shared Reports option to specify
that you want to share your report across all domains.
You can also use report filters to reduce the amount of unwanted or unnecessary log
information compiled in each report. This makes it easier for you to focus on only the log
data of interest to you. You can specify criteria to filter your log data on any of the columns
that you have chosen to base the report.
Chapter 20: Reporting
813
Need help?
Do you have a question about the NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?
Questions and answers