Table 112: Screen Reports - Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Copyright © 2010, Juniper Networks, Inc.
Table 111: DI/IDP Reports (continued)
Report
Critical Attacks (last 24 hours)
Critical Attacks Prevented (last 24 hours)
Critical Thru Medium Attacks (last 24
hours)
Critical Thru Medium Attacks Prevented
(last 24 hours)
Top 50 Scan Sources (last 7 days)
Top 50 Scan Targets (last 7 days)
Profiler - New Hosts (last 7 days)
Profiler - New Ports (last 7 days)
Profiler - New Protocols (last 7 days)
Top IDP Rules
Screen Reports
When the firmware on your device identifies an attack, it generates a log event. These
events are totaled and summarized for your review in the reports shown in Table 112 on
page 813.

Table 112: Screen Reports

Report
Description
Top Screen Attacks
The most common attacks detected by the firmware on your security
device
Screen Attacks by
The number of attacks detected by the firmware on your security device
Severity
according to severity level
Description
All attacks categorized as "critical" detected during
the past 24 hours.
All attacks categorized as "critical" prevented during
the past 24 hours.
All attacks categorized as either "critical" or "
medium" detected during the past 24 hours.
All attacks categorized as either "critical" or "medium"
prevented during the past 24 hours.
50 IP addresses that have most frequently performed
a scan of a managed device.
50 IP addresses that have most frequently been the
target of a scan over the last 7 days.
New Hosts listed in the Profiler over the last 7 days.
New Ports listed in the Profiler over the last 7 days.
New Protocols listed in the Profiler over the last 7
days.
The total number of log entries generated by specific
rules in your IDP policies. You can use the Top Rules
report to identify those rules that are generating the
most log events. This enables you to better optimize
your rulebases by identifying those rules that are most
and least effective. You can then modify or remove
those rules from your security policies.
Chapter 20: Reporting
813

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.4

Table of Contents