Juniper Secure Analytics

Size: px
Start display at page:

Download "Juniper Secure Analytics"

Transcription

1 Juniper Secure Analytics Users Guide Release Modified:

2 Juniper Networks, Inc Innovation Way Sunnyvale, California USA All rights reserved. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Juniper Secure Analytics Users Guide All rights reserved. The information in this document is current as of the date on the title page. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year However, the NTP application is known to have some difficulty in the year END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at By downloading, installing or using such software, you agree to the terms and conditions of that EULA. ii

3 Table of Contents About the Documentation xiii Documentation and Release Notes xiii Documentation Conventions xiii Documentation Feedback xv Requesting Technical Support xvi Self-Help Online Tools and Resources xvi Opening a Case with JTAC xvi Part 1 Juniper Secure Analytics Users Guide Chapter 1 Understanding Juniper Secure Analytics JSA Overview Supported Web Browsers Enabling Document Mode and Browser Mode in Internet Explorer Accessing JSA Understanding User Interface Tabs Understanding JSA Common Procedures Viewing Messages Sorting Results Refreshing and Pausing the User Interface Investigate User Names System Time Updating user details Access Online Help Resize Columns Configure Page Size Chapter 2 Managing Dashboard Understanding Dashboard Management Default Dashboards Custom Dashboards Customizing the Dashboard Flow Search Offenses Log Activity Most Recent Reports System Summary System Notification Creating a Custom Dashboard Using the Dashboard to Investigate Log or Network Activity Configuring Charts iii

4 Juniper Secure Analytics Users Guide Removing Dashboard Items Detaching a Dashboard Item Renaming a Dashboard Deleting a Dashboard Managing System Notifications Adding Search-based Dashboard Items to the Add Items List Chapter 3 Offense Management Offense Overview Offense Permission Considerations Key Terms Offense Retention Offense Monitoring Monitoring the All Offenses or My Offenses Pages Monitoring Offenses Grouped by Category Monitoring Offenses Grouped by Source IP Monitoring Offenses Grouped by Destination IP Monitoring Offenses Grouped by Network Offense Management Tasks Adding notes Hiding Offenses Showing Hidden Offenses Closing Offenses Protecting Offenses Unprotecting Offenses Exporting Offenses Assigning Offenses to Users Sending Notification Marking an Item for Follow-Up Offense Parameters Chapter 4 Log Activity Investigation Log Activity Tab Overview Log Activity Tab Toolbar Quick Filter Syntax Right-click Menu Options Status Bar Log Activity Monitoring Viewing Streaming Events Viewing Normalized Events Viewing Raw Events Viewing Grouped Events Event Details Event Details Toolbar Viewing Associated Offenses Modifying Event Mapping iv

5 Table of Contents Tuning False Positives Managing PCAP Data Displaying the PCAP Data Column Viewing PCAP Information Downloading the PCAP File to Your Desktop System Exporting Events Chapter 5 Network Activity Investigation Network Tab Overview Network Activity Tab Toolbar Quick Filter Syntax Right-click Menu Options Status Bar OverFlow Records Network Activity Monitoring Viewing Streaming Flows Viewing Normalized Flows Viewing Grouped Flows Flow Details Flow Details Toolbar Tuning False Positives Exporting Flows Chapter 6 Chart Management Chart Management Overview Time Series Chart Overview Chart Legends Configuring Charts Chapter 7 Data Searches Event and Flow Searches Searching for Items that Match your Criteria Saving Search Criteria Offense Searches Searching Offenses on the My Offenses and All Offenses Pages Searching Offenses on the By Source IP Page Searching Offenses on the By Destination IP Page Searching Offenses on the By Networks Page Saving Search Criteria on the Offenses Tab Deleting Search Criteria Using a Subsearch to Refine Search Results Managing Search Results Saving Search Results Viewing Managed Search Results Canceling a Search Deleting a Search Managing Search Groups Viewing Search Groups Creating a New Search Group Editing a Search Group v

6 Juniper Secure Analytics Users Guide Copying a Saved Search to Another Group Removing a Group or a Saved Search from a Group Chapter 8 Custom Event and Flow Properties Understanding Custom Event and Flow Properties Required Permissions Custom Property Types Creating a Regex-based Custom Property Creating a Calculation-based Custom Property Modifying a Custom Property Copying a Custom Property Deleting a Custom Property Chapter 9 Managing Rule Rule Permission Considerations Rules Overview Rule Categories Rule Types Rule Conditions Rule Responses Viewing Rules Creating a Custom Rule Rule Management Tasks Enabling and Disabling Rules Editing a Rule Copying a Rule Deleting a Rule Managing Rule Group Viewing a Rule Group Creating a Group Assigning an Item to a Group Editing a Group Copying an Item to Another Group Deleting an Item from a Group Deleting a Group Editing Building Blocks Understanding Rule Page Parameters Rules Page Toolbar Rule Response Page Parameters Chapter 10 Assets Profile Page Parameters Assets Profile Page Parameters Overview Understanding Asset Profiles Understanding Vulnerabilities Assets Tab Overview Asset Tab List Right-click Menu Options Viewing an Asset Profile Adding or Editing an Asset Profile Searching Asset Profiles vi

7 Table of Contents Saving Asset Search Criteria Asset Search Groups Viewing Search Groups Creating a New Search Group Editing a Search Group Copying a Saved Search to Another Group Removing a Group or a Saved Search From a Group Managing Asset Profile Deleting Assets Importing Asset Profiles Exporting Assets Researching Asset Vulnerabilities Assets Profile Page Parameters Asset Summary Pane Network Interface Summary Pane Vulnerability Pane Services Pane Windows Services Pane Packages Pane Windows Patches Pane Properties Pane Risk Policies Pane Products Pane Chapter 11 Managing Report Report Management Overview Status Bar Report Layout Chart Types Report Tab Toolbar Graph Types Creating Custom Reports Editing a Report Viewing Generated Reports Deleting Generated Content Manually Generating a Report Duplicating a Report Sharing a Report Branding Reports Managing Report Groups Creating a Report Group Editing a Group Assign a Report to a Group Copying a Report to Another Group Removing a Report Understanding Chart Container Asset Vulnerabilities Chart Container Parameters Event/Logs Chart Container Parameters Flows Chart Container Parameters vii

8 Juniper Secure Analytics Users Guide Top Source IPs Chart Container Parameters Top Offenses Chart Container Parameters Top Destination IPs Chart Container Parameters Glossary Part 2 Index Index viii

9 List of Tables About the Documentation xiii Table 1: Notice Icons xiv Table 2: Text and Syntax Conventions xiv Part 1 Juniper Secure Analytics Users Guide Chapter 1 Understanding Juniper Secure Analytics Table 3: Supported Web Browsers For JSA Products Table 4: Default Login Information for JSA Table 5: Administration Management Tools Available in JSA Table 6: Functions Available in the Messages Window Table 7: Menu Options for User Name Investigation Chapter 2 Managing Dashboard Table 8: Default Dashboards Table 9: Offense Items Table 10: Log Activity Dashboard Item Table 11: Chart Types Table 12: Configuring Charts Chapter 3 Offense Management Table 13: Offense Tab Key Terms Table 14: Pages that can be Accessed from the Offenses tab Table 15: of Offenses Tab Parameters Chapter 4 Log Activity Investigation Table 16: Log Activity Toolbar Options Table 17: Right-click Menu Options Table 18: Log Activity Tab - Default (Normalized) Parameters Table 19: Raw Event Parameters Table 20: Grouped Events Options Table 21: Grouped Event Parameters Table 22: Events Details Table 23: Event Details Toolbar Chapter 5 Network Activity Investigation Table 24: Network Activity Tab Toolbar Options Table 25: Right-click Menu Options Table 26: Parameters for the Network Activity Tab Table 27: Grouped Flow Options Table 28: Grouped Flow Parameters Table 29: Flow Details ix

10 Juniper Secure Analytics Users Guide Table 30: of the Flow Details Toolbar Chapter 6 Chart Management Table 31: Time Series Charts Functions Chapter 7 Data Searches Table 32: Search Options Table 33: My Offenses and All Offenses Page Search Pptions Table 34: Offense Type Options Table 35: By Source IP Page Search Options Table 36: By Destination IP Page Search Options Table 37: Search Options for Search Offense Data on the By Networks Page Table 38: Manage Search Results Page Parameters Table 39: Manage Search Results Toolbar Table 40: Search Group Window Parameters Table 41: Search Group Window Toolbar Functions Chapter 8 Custom Event and Flow Properties Table 42: Custom Property Definition Window Parameters (regex) Table 43: Custom Property Definition Window Parameters (calculation) Table 44: Custom Properties Window Columns Table 45: Custom Property Toolbar Options Chapter 9 Managing Rule Table 46: Rules Page Parameters Table 47: Rules Page Toolbar Function Table 48: Event, Flow, and Common Rule Response Page Parameters Table 49: Offense Rule Response Page Parameters Chapter 10 Assets Profile Page Parameters Table 50: Asset Profile Page Parameters Table 51: Right-click Menu Options Table 52: Viewing an Asset Profile Table 53: Asset Profile Table 54: Asset Profile Table 55: Owner Pane Parameter Options Table 56: Saving Asset Search Criteria Table 57: Asset Search Groups Window Toolbar Functions Table 58: Research Asset Vulnerabilities Table 59: Asset Summary Pane Parameters Table 60: Network Interface Summary Pane Parameters Table 61: Vulnerability Pane Parameters Table 62: Services Pane Parameters Table 63: Windows Services Pane Parameters Table 64: Packages Pane Parameters Table 65: Windows Patch Pane Table 66: Properties Pane Parameters Table 67: Risk Policies Pane Parameters Table 68: Products Pane Parameters Chapter 11 Managing Report x

11 List of Tables Table 69: Report Tab Toolbar Options Table 70: Graph Types Table 71: Asset Vulnerabilities Chart Container Parameters Table 72: Event/Logs Chart Container Parameters Table 73: Flows chart container details Table 74: Top Source IPs Chart Container Parameters Table 75: Top Offenses chart Container Parameters Table 76: Top Destination IPs Chart Container Parameters xi

12 Juniper Secure Analytics Users Guide xii

13 About the Documentation Documentation and Release Notes Documentation and Release Notes on page xiii Documentation Conventions on page xiii Documentation Feedback on page xv Requesting Technical Support on page xvi Documentation Conventions To obtain the most current version of all Juniper Networks technical documentation, see the product documentation page on the Juniper Networks website at If the information in the latest release notes differs from the information in the documentation, follow the product Release Notes. Juniper Networks Books publishes books by Juniper Networks engineers and subject matter experts. These books go beyond the technical documentation to explore the nuances of network architecture, deployment, and administration. The current list can be viewed at Table 1 on page xiv defines notice icons used in this guide. xiii

14 Juniper Secure Analytics Users Guide Table 1: Notice Icons Icon Meaning Informational note Indicates important features or instructions. Caution Indicates a situation that might result in loss of data or hardware damage. Warning Alerts you to the risk of personal injury or death. Laser warning Alerts you to the risk of personal injury from a laser. Tip Indicates helpful information. Best practice Alerts you to a recommended use or implementation. Table 2: Text and Syntax Conventions Table 2 on page xiv defines the text and syntax conventions used in this guide. Convention Examples Bold text like this Represents text that you type. To enter configuration mode, type the configure command: user@host> configure Fixed-width text like this Italic text like this Represents output that appears on the terminal screen. Introduces or emphasizes important new terms. Identifies guide names. Identifies RFC and Internet draft titles. user@host> show chassis alarms No alarms currently active A policy term is a named structure that defines match conditions and actions. Junos OS CLI User Guide RFC 1997, BGP Communities Attribute Italic text like this Represents variables (options for which you substitute a value) in commands or configuration statements. Configure the machine s domain name: [edit] root@# set system domain-name domain-name xiv

15 About the Documentation Table 2: Text and Syntax Conventions (continued) Convention Examples Text like this Represents names of configuration statements, commands, files, and directories; configuration hierarchy levels; or labels on routing platform components. To configure a stub area, include the stub statement at the [edit protocols ospf area area-id] hierarchy level. The console port is labeled CONSOLE. < > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>; (pipe symbol) Indicates a choice between the mutually exclusive keywords or variables on either side of the symbol. The set of choices is often enclosed in parentheses for clarity. broadcast multicast (string1 string2 string3) # (pound sign) Indicates a comment specified on the same line as the configuration statement to which it applies. rsvp { # Required for dynamic MPLS only [ ] (square brackets) Encloses a variable for which you can substitute one or more values. community name members [ community-ids ] Indention and braces ( { } ) ; (semicolon) Identifies a level in the configuration hierarchy. Identifies a leaf statement at a configuration hierarchy level. [edit] routing-options { static { route default { nexthop address; retain; } } } GUI Conventions Bold text like this Represents graphical user interface (GUI) items you click or select. In the Logical Interfaces box, select All Interfaces. To cancel the configuration, click Cancel. > (bold right angle bracket) Separates levels in a hierarchy of menu selections. In the configuration editor hierarchy, select Protocols>Ospf. Documentation Feedback We encourage you to provide feedback, comments, and suggestions so that we can improve the documentation. You can provide feedback by using either of the following methods: Online feedback rating system On any page at the Juniper Networks Technical Documentation site at simply click the stars to rate the content, and use the pop-up form to provide us with information about your experience. Alternately, you can use the online feedback form at xv

16 Juniper Secure Analytics Users Guide Send your comments to Include the document or topic name, URL or page number, and software version (if applicable). Requesting Technical Support Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC). If you are a customer with an active J-Care or Partner Support Service support contract, or are covered under warranty, and need post-sales technical support, you can access our tools and resources online or open a case with JTAC. JTAC policies For a complete understanding of our JTAC procedures and policies, review the JTAC User Guide located at Product warranties For product warranty information, visit JTAC hours of operation The JTAC centers have resources available 24 hours a day, 7 days a week, 365 days a year. Self-Help Online Tools and Resources For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings: Search for known bugs: Find product documentation: Find solutions and answer questions using our Knowledge Base: Download the latest versions of software and review release notes: Search technical bulletins for relevant hardware and software notifications: Join and participate in the Juniper Networks Community Forum: Open a case online in the CSC Case Management tool: To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool: Opening a Case with JTAC You can open a case with JTAC on the Web or by telephone. Use the Case Management tool in the CSC at Call JTAC ( toll-free in the USA, Canada, and Mexico). xvi

17 About the Documentation For international or direct-dial options in countries without toll-free numbers, see xvii

18 Juniper Secure Analytics Users Guide xviii

19 PART 1 Juniper Secure Analytics Users Guide Understanding Juniper Secure Analytics on page 3 Managing Dashboard on page 13 Offense Management on page 29 Log Activity Investigation on page 61 Network Activity Investigation on page 83 Chart Management on page 101 Data Searches on page 107 Custom Event and Flow Properties on page 133 Managing Rule on page 143 Assets Profile Page Parameters on page 165 Managing Report on page 191 1

20 Juniper Secure Analytics Users Guide 2

21 CHAPTER 1 Understanding Juniper Secure Analytics JSA Overview This chapter describes about the following sections: JSA Overview on page 3 Supported Web Browsers on page 4 Enabling Document Mode and Browser Mode in Internet Explorer on page 4 Accessing JSA on page 5 Understanding User Interface Tabs on page 5 Understanding JSA Common Procedures on page 7 Juniper Secure Analytics (JSA) is a network security management platform that provides situational awareness and compliance support through the combination of flow-based network knowledge, security event correlation, and asset-based vulnerability assessment. Default license key A default license key provides access to the user interface for five weeks. After you log in to JSA, a window displays the date that the temporary license key expires. For more information about installing a license key, see the Juniper Secure Analytics Administration Guide. Security exceptions and certificates If you are using the Mozilla Firefox web browser, you must add an exception to Mozilla Firefox to log in to JSA. For more information, see your Mozilla Firefox web browser documentation. If you are using the Microsoft Internet Explorer web browser, a website security certificate message is displayed when you access the JSA system. You must select the Continue to this website option to log in to JSA. Navigate the web-based application When you use JSA, use the navigation options available in the JSA user interface instead of your web browser Back button. Related Documentation Supported Web Browsers on page 4 Enabling Document Mode and Browser Mode in Internet Explorer on page 4 3

22 Juniper Secure Analytics Users Guide Accessing JSA on page 5 Supported Web Browsers For the features in Juniper Secure Analytics (JSA) products to work properly, you must use a supported web browser. When you access the JSA system, you are prompted for a user name and a password. The user name and password must be configured in advance by the administrator. Table 3 on page 4 lists the supported versions of web browsers. Table 3: Supported Web Browsers For JSA Products Web browser Supported version Mozilla Firefox 10.0 Extended Support Release (ESR) Microsoft Internet Explorer, with document mode and browser mode enabled Google Chrome Latest version Related Documentation Enabling Document Mode and Browser Mode in Internet Explorer on page 4 Accessing JSA on page 5 JSA Overview on page 3 Enabling Document Mode and Browser Mode in Internet Explorer If you use Microsoft Internet Explorer to access Juniper Secure Analytics (JSA) products, you must enable browser mode and document mode. To enable browser and document mode: 1. In your Internet Explorer web browser, press F12 to open the Developer Tools window. 2. Click Browser Mode and select the version of your web browser. 3. Click Document Mode and select Internet Explorer 7.0 Standards. Related Documentation Supported Web Browsers on page 4 Accessing JSA on page 5 Understanding User Interface Tabs on page 5 4

23 Chapter 1: Understanding Juniper Secure Analytics Accessing JSA Juniper Secure Analytics (JSA) is a web-based application. JSA uses default login information for the URL, user name, and password. Table 4 on page 5 provides the login information in to your JSA console. Table 4: Default Login Information for JSA Login information Default URL Address>, Where <IP Address> is the IP address of the JSA console. User name admin Password The password that is assigned to JSA during the installation process. License key A default license key provides you access to the system for 5 weeks. Related Documentation JSA Overview on page 3 Supported Web Browsers on page 4 Enabling Document Mode and Browser Mode in Internet Explorer on page 4 Understanding User Interface Tabs on page 5 Understanding JSA Common Procedures on page 7 Understanding User Interface Tabs Functionality is divided into tabs. The Dashboard tab is displayed when you log in. You can easily navigate the tabs to locate the data or functionality you require. Dashboard tab The Dashboard tab is the default tab that is displayed when you log in. The Dashboard tab provides a workspace environment that supports multiple dashboards on which you can display your views of network security, activity, or data that JSA collects. Five default dashboards are available. Each dashboard contains items that provide summary and detailed information about offenses that occur on your network. You can also create a custom dashboard to allow you to focus on your security or network operations responsibilities. For more information about using the Dashboard tab, see Network Tab Overview on page 83. The Dashboard tab is the default tab that is displayed when you log in to Log Analytics. It provides a workspace environment that provides summary and detailed information on events occurring in your network. Offenses tab 5

24 Juniper Secure Analytics Users Guide The Offenses tab will allow you to view offenses that occur on your network, which you can locate by using various navigation options or through powerful searches. From the Offenses tab, you can investigate an offense to determine the root cause of an issue. You can also resolve the issue. For more information about Offenses tab, see Offense Management on page 29. Log activity tab The Log Activity tab will allow you to investigate event logs being sent to JSA in real-time, perform powerful searches, and view log activity by using configurable time-series charts. The Log Activity tab will allow you to perform in-depth investigations on event data. For more information, see Log Activity Investigation on page 61. Network activity tab Use the Network Activity tab to investigate flows that are sent in real-time, perform powerful searches, and view network activity by using configurable time-series charts. A flow is a communication session between two hosts. Viewing flow information will allow you to determine how the traffic is communicated, what is communicated (if the content capture option is enabled), and who is communicating. Flow data also includes details such as protocols, ASN values, IFIndex values, and priorities. For more information, see Network Tab Overview on page 83. Assets tab JSA automatically discovers assets, servers, and hosts, operating on your network. Automatic discovery is based on passive flow data and vulnerability data, allowing JSA to build an asset profile. Asset profiles provide information about each known asset in your network, including identity information, if available, and what services are running on each asset. This profile data is used for correlation purposes to help reduce false positives. For example, an attack tries to use a specific service that is running on a specific asset. In this situation, JSA can determine whether the asset is vulnerable to this attack by correlating the attack to the asset profile. Using the Assets tab, you can view the learned assets or search for specific assets to view their profiles. For more information, see Assets Profile Page Parameters on page

25 Chapter 1: Understanding Juniper Secure Analytics Reports tab The Reports tab will allow you to create, distribute, and manage reports for any data within JSA. The Reports feature will allow you to create customized reports for operational and executive use. To create a report, you can combine information (such as, security or network) into a single report. You can also use preinstalled report templates that are included with JSA. The Reports tab also will allow you to brand your reports with customized logos. This customization is beneficial for distributing reports to different audiences. For more information about reports, see Report Management Overview on page 191. Admin tab Administrators use the Admin tab to configure and manage the users, systems, networks, plug-ins, and components. Users with administration privileges can access the Admin tab. Table 5 on page 7 describes the administration tools that administrators can access in the Admin. Table 5: Administration Management Tools Available in JSA Admin tool System Configuration Configure system and user management options. Data Sources Configure log sources, flow sources, and vulnerability options. Remote Networks and Services Configuration Configure remote networks and services groups. Plug-ins This option is only displayed if there are plug-ins that are installed on your console. Deployment Editor Manage the individual components of your JSA deployment. All configuration updates that you make in the Admin tab are saved to a staging area. When all changes are complete, you can deploy the configuration updates to the managed host in your deployment. Related Documentation Enabling Document Mode and Browser Mode in Internet Explorer on page 4 Accessing JSA on page 5 Understanding JSA Common Procedures on page 7 Understanding JSA Common Procedures Various controls on the JSA user interface are common to most user interface tabs. 7

26 Juniper Secure Analytics Users Guide Viewing Messages The Messages menu, which is on the upper right corner of the user interface, provides access to a window in which you can read and manage your system notifications. For system notifications to show on the Messages window, the administrator must create a rule that is based on each notification message type and select the Notify check box in the Custom Rules Wizard. The Messages menu indicates how many unread system notifications you have in your system. This indicator increments the number until you close system notifications. For each system notification, the Messages window provides a summary and the date stamp for when the system notification was created. You can hover your mouse pointer over a notification to view more detail. Using the functions on the Messages window, you can manage the system notifications. System notifications are also available on the Dashboard tab and on an optional pop-up window that can be displayed on the lower left corner of the user interface. Actions that you perform in the Messages window are propagated to the Dashboard tab and the pop-up window. For example, if you close a system notification from the Messages window, the system notification is removed from all system notification displays. For more information about Dashboard system notifications, see Managing System Notifications on page 26. Table 6 on page 8 provides the Messages window functions. Table 6: Functions Available in the Messages Window Function All Click All to view all system notifications. This option is the default, therefore, you click All only if you selected another option and want to display all system notifications again. Health Click Health to view only system notifications that have a severity level of Health. Errors Click Errors to view only system notifications that have a severity level of Error. Warnings Click Warnings to view only the system notifications that have a severity level of Warning. Information Click Information to view only the system notifications that have a severity level of information. Dismiss All Click Dismiss All to close all system notifications from your system. If you filtered the list of system notifications by using the Health, Errors, Warnings, or Information icons, the text on the View All icon changes to one of the following options: Dismiss All Errors Dismiss All Health Dismiss All Warnings Dismiss All Info 8

27 Chapter 1: Understanding Juniper Secure Analytics Table 6: Functions Available in the Messages Window (continued) Function View All Click View All to view the system notification events in the Log Activity tab. If you filtered the list of system notifications by using the Health, Errors, Warnings, or Information icons, the text on the View All icon changes to one of the following options: View All Errors View All Health View All Warnings View All Info Dismiss Click the Dismiss icon beside a system notification to close the system notification from your system. To view messages: 1. Log in to JSA. 2. On the upper right corner of the user interface, click Messages. 3. On the Messages window, view the system notification details. 4. Optional. To refine the list of system notifications, click one of the following options: Errors Warnings Information 5. Optional. To close system notifications, choose of the following options: Option Dismiss All Click to close all system notifications. Dismiss Click the Dismiss icon next to the system notification that you want to close. 6. Optional. To view the system notification details, hover your mouse pointer over the system notification. Sorting Results You sort the results in tables by clicking a column heading. An arrow at the top of the column indicates the direction of the sort. To sort results: 1. Log in to JSA. 2. Click the column header once to sort the table in descending order; twice to sort the table in ascending order. 9

28 Juniper Secure Analytics Users Guide Refreshing and Pausing the User Interface You can manually refresh, pause, and play the data that is displayed on tabs. The Dashboard and Offenses tabs automatically refresh every 60 seconds. The Log Activity and Network Activity tabs automatically refresh every 60 seconds if you are viewing the tab in Last Interval (auto refresh) mode. The Log Activity tab automatically refreshes every 60 seconds if you are viewing the tab in Last Interval (auto refresh) mode. The timer, which is on the upper right corner of the interface, indicates the amount of time until the tab is automatically refreshed. When you view the Log Activity or Network Activity tab in Real Time (streaming) or Last Minute (auto refresh) mode, you can use the Pause icon to pause the current display. When you view the Log Activity tab in Real Time (streaming) or Last Minute (auto refresh) mode, you can use the Pause icon to pause the current display. You can also pause the current display in the Dashboard tab. Clicking anywhere inside a dashboard item automatically pauses the tab. The timer flashes red to indicate that the current display is paused. To refresh or pause the user interface: 1. Log in to JSA. 2. Click the tab that you want to view. 3. Choose one of the following options: Option Refresh Click Refresh, on the right corner of the tab, to refresh the tab. Pause Click to pause the display on the tab. Play Click to restart the timer after the timer is paused. Investigate User Names You can right-click a user name to access more menu options. Use these options to view more information about the user name or IP address. Table 7 on page 11 describes the menu options for user name investigation. 10

29 Chapter 1: Understanding Juniper Secure Analytics Table 7: Menu Options for User Name Investigation Option View Assets Displays current assets that are associated to the selected user name. For more information about viewing assets, see Assets Profile Page Parameters on page 165. View User History Displays all assets that are associated to the selected user name over the previous 24 hours. View Events Displays the events that are associated to the selected user name. For more information about the List of Events window, see Log Activity Monitoring on page 65. For more information about customizing the right-click menu, see the Juniper Secure Analytics Administration Guide. System Time The right corner of the JSA user interface displays system time, which is the time on the console. The console time synchronizes JSA systems within the JSA deployment. The console time is used to determine what time events were received from other devices for correct time synchronization correlation. In a distributed deployment, the console might be in a different time zone from your desktop computer. When you apply time-based filters and searches on the Log Activity and Network Activity tabs, you must use the console system time to specify a time range. When you apply time-based filters and searches on the Log Activity tab, you must use the console system time to specify a time range. Updating user details You can update your user details through the main JSA user interface: To update user details: 1. To access your user information, click Preferences. 2. As required, update the following parameters: Option Username Displays your user name. You cannot edit this field. Password Type a new password. The password must meet the following criteria: Minimum of six characters Maximum of 255 characters Contain at least one special character Contain at least one special character Contain one uppercase character 11

30 Juniper Secure Analytics Users Guide Option Password (Confirm) Type the password again for confirmation. Address Type your address. The address must meet the following requirements: Valid address Minimum of 10 characters Maximum of 255 characters Enable Popup Notifications Select this check box if you want to enable pop-up system notifications to be displayed on your user interface. Access Online Help You can access the JSA Online Help through the main JSA user interface. To access the Online Help, click Help > Help Contents. Resize Columns You can resize the columns on several tabs in JSA. Place the pointer of your mouse over the line that separates the columns and drag the edge of the column to the new location. You can also resize columns by double-clicking the line that separates the columns to automatically resize the column to the width of the largest field. NOTE: Column resizing does not work in Microsoft Internet Explorer, Version 7.0 web browsers when tabs are displaying records in streaming mode. Configure Page Size Users with administrative privileges can configure the maximum number of results that display in the tables on various tabs in JSA. Related Documentation JSA Overview on page 3 Enabling Document Mode and Browser Mode in Internet Explorer on page 4 Accessing JSA on page 5 12

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Virtual Appliance Installation Guide Release 2014.1 Published: 2014-12-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Big Data Management Guide Release 2014.1 Published: 2014-03-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Big Data Management Guide Release 2014.2 Published: 2014-08-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Managing Service Design for PTP Timing

Managing Service Design for PTP Timing Managing Service Design for PTP Timing Published: 2012-02-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Junos Space. Audit Logs. Release 14.1. Published: 2014-08-21. Copyright 2014, Juniper Networks, Inc.

Junos Space. Audit Logs. Release 14.1. Published: 2014-08-21. Copyright 2014, Juniper Networks, Inc. Junos Space Audit Logs Release 14.1 Published: 2014-08-21 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Vulnerability Manager User Guide Release 2014.2 Published: 2014-12-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

STRM Log Manager Users Guide

STRM Log Manager Users Guide Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-01-08 Copyright Notice Copyright 2012

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Analyzers for EX9200 Switches Release 13.3 Published: 2014-08-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos Space. User Interface. Release 14.1. Published: 2014-08-19. Copyright 2014, Juniper Networks, Inc.

Junos Space. User Interface. Release 14.1. Published: 2014-08-19. Copyright 2014, Juniper Networks, Inc. Junos Space User Interface Release 14.1 Published: 2014-08-19 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Junos Space. Network Director Monitor Mode User Guide. Release 1.5. Published: 2013-10-15. Copyright 2013, Juniper Networks, Inc.

Junos Space. Network Director Monitor Mode User Guide. Release 1.5. Published: 2013-10-15. Copyright 2013, Juniper Networks, Inc. Junos Space Network Director Monitor Mode User Guide Release 1.5 Published: 2013-10-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Junos Space. Network Director Monitor Mode User Guide. Release 1.6. Published: 2014-06-30. Copyright 2014, Juniper Networks, Inc.

Junos Space. Network Director Monitor Mode User Guide. Release 1.6. Published: 2014-06-30. Copyright 2014, Juniper Networks, Inc. Junos Space Network Director Monitor Mode User Guide Release 1.6 Published: 2014-06-30 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Firefly Host. Installation and Upgrade Guide for VMware. Release 6.0. Published: 2014-01-14. Copyright 2014, Juniper Networks, Inc.

Firefly Host. Installation and Upgrade Guide for VMware. Release 6.0. Published: 2014-01-14. Copyright 2014, Juniper Networks, Inc. Firefly Host Installation and Upgrade Guide for VMware Release 6.0 Published: 2014-01-14 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Administration Guide Release 204.2 Modified: 206-0-28 Copyright 206, Juniper Networks, Inc. Juniper Networks, Inc. Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Log Sources Users Guide Release 2014.1 Modified: 2015-11-30 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Junos Space Security Director

Junos Space Security Director Junos Space Security Director Logging and Reporting Getting Started Guide Release 13.3 Published: 2014-04-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.4 Published: 2015-02-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Configuration and File Management Feature Guide for QFabric Systems

Configuration and File Management Feature Guide for QFabric Systems Configuration and File Management Feature Guide for QFabric Systems Release 14.1X53 Modified: 2015-08-20 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

DDoS Secure. VMware Virtual Edition Installation Guide. Release 5.13.2-0. Published: 2013-11-25. Copyright 2013, Juniper Networks, Inc.

DDoS Secure. VMware Virtual Edition Installation Guide. Release 5.13.2-0. Published: 2013-11-25. Copyright 2013, Juniper Networks, Inc. DDoS Secure VMware Virtual Edition Installation Guide Release 5.13.2-0 Published: 2013-11-25 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Pulse Access Control Service

Junos Pulse Access Control Service Junos Pulse Access Control Service User Access Management Framework Feature Guide Release 5.0 Published: 2013-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager Release 2013.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-15 Copyright Notice Copyright 2013

More information

SRC Virtualization. Modified: 2015-06-19. Copyright 2015, Juniper Networks, Inc.

SRC Virtualization. Modified: 2015-06-19. Copyright 2015, Juniper Networks, Inc. SRC Virtualization Modified: 2015-06-19 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted

More information

Service Central. Published: 2014-03-10. Copyright 2014, Juniper Networks, Inc.

Service Central. Published: 2014-03-10. Copyright 2014, Juniper Networks, Inc. Service Central Published: 2014-03-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted

More information

Junos Pulse. Windows In-Box Junos Pulse Client Solution. Release 5.0. Published: 2013-11-20. Copyright 2013, Juniper Networks, Inc.

Junos Pulse. Windows In-Box Junos Pulse Client Solution. Release 5.0. Published: 2013-11-20. Copyright 2013, Juniper Networks, Inc. Junos Pulse Windows In-Box Junos Pulse Client Solution Release 5.0 Published: 2013-11-20 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: 2016-06-10. Copyright 2016, Juniper Networks, Inc.

Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: 2016-06-10. Copyright 2016, Juniper Networks, Inc. Junos Space Junos Space Security Director Restful Web Services API Reference Modified: 2016-06-10 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos OS. Integrated User Firewall Feature Guide for Security Devices. Release 12.1X47-D10. Published: 2014-09-15

Junos OS. Integrated User Firewall Feature Guide for Security Devices. Release 12.1X47-D10. Published: 2014-09-15 Junos OS Integrated User Firewall Feature Guide for Security Devices Release 12.1X47-D10 Published: 2014-09-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos OS. System Log Messages. Release 15.1. Modified: 2015-05-19. Copyright 2015, Juniper Networks, Inc.

Junos OS. System Log Messages. Release 15.1. Modified: 2015-05-19. Copyright 2015, Juniper Networks, Inc. Junos OS System Log Messages Release 15.1 Modified: 2015-05-19 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

Building and Managing a Branch Office Network Using Junos Space Network Director

Building and Managing a Branch Office Network Using Junos Space Network Director Building and Managing a Branch Office Network Using Junos Space Network Director Release 1.6 Published: 2015-01-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Configuring Offboard Storage Guide Release 2014.3 Published: 2015-01-19 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

CTPView Network Management System Administration

CTPView Network Management System Administration CTPView Network Management System Administration Modified: 2015-09-29 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Services Feature Guide for EX4600 Switches Release 14.1X53 Modified: 2015-08-26 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Network Monitoring. Published: 2013-05-20. Copyright 2013, Juniper Networks, Inc.

Network Monitoring. Published: 2013-05-20. Copyright 2013, Juniper Networks, Inc. Network Monitoring Published: 2013-05-20 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted

More information

Subscriber Traffic Redirection

Subscriber Traffic Redirection Subscriber Traffic Redirection Published: 2012-12-13 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Installation Guide Release 2014.1 Published: 2014-11-26 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Log Event Extended Format Release 2014.6 Modified: 2016-04-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Junos OS. Firewall Filters Feature Guide for Routing Devices. Release 13.2. Published: 2013-09-17. Copyright 2013, Juniper Networks, Inc.

Junos OS. Firewall Filters Feature Guide for Routing Devices. Release 13.2. Published: 2013-09-17. Copyright 2013, Juniper Networks, Inc. Junos OS Firewall Filters Feature Guide for Routing Devices Release 13.2 Published: 2013-09-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Space. Junos Space Network Management Platform Getting Started Guide. Release 14.1. Modified: 2015-07-27

Junos Space. Junos Space Network Management Platform Getting Started Guide. Release 14.1. Modified: 2015-07-27 Junos Space Junos Space Network Management Platform Getting Started Guide Release 14.1 Modified: 2015-07-27 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Intrusion Detection and Prevention

Intrusion Detection and Prevention Intrusion Detection and Prevention Published: 2013-08-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy SNMP

More information

Junos OS. MPLS Network Operations Guide. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc.

Junos OS. MPLS Network Operations Guide. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc. Junos OS MPLS Network Operations Guide Published: 2012-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy

More information

Firewall Filters Feature Guide for EX9200 Switches

Firewall Filters Feature Guide for EX9200 Switches Firewall Filters Feature Guide for EX9200 Switches Release 15.1 Modified: 2015-06-28 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks,

More information

Junos OS. Distributed Denial-of-Service Protection Feature Guide. Release 13.2. Published: 2013-07-25. Copyright 2013, Juniper Networks, Inc.

Junos OS. Distributed Denial-of-Service Protection Feature Guide. Release 13.2. Published: 2013-07-25. Copyright 2013, Juniper Networks, Inc. Junos OS Distributed Denial-of-Service Protection Feature Guide Release 13.2 Published: 2013-07-25 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Firefly Host. Getting Started Guide for VMware. Release 6.0. Published: 2014-06-23. Copyright 2014, Juniper Networks, Inc.

Firefly Host. Getting Started Guide for VMware. Release 6.0. Published: 2014-06-23. Copyright 2014, Juniper Networks, Inc. Firefly Host Getting Started Guide for VMware Release 6.0 Published: 2014-06-23 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Junos OS. DHCP Relay Agent Feature Guide for Subscriber Management. Release 13.3. Published: 2013-12-05. Copyright 2013, Juniper Networks, Inc.

Junos OS. DHCP Relay Agent Feature Guide for Subscriber Management. Release 13.3. Published: 2013-12-05. Copyright 2013, Juniper Networks, Inc. Junos OS DHCP Relay Agent Feature Guide for Subscriber Management Release 13.3 Published: 2013-12-05 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos OS. Authentication and Integrated User Firewalls Feature Guide for Security Devices. Release 12.3X48-D10. Modified: 2015-09-01

Junos OS. Authentication and Integrated User Firewalls Feature Guide for Security Devices. Release 12.3X48-D10. Modified: 2015-09-01 Junos OS Authentication and Integrated User Firewalls Feature Guide for Security Devices Release 12.3X48-D10 Modified: 2015-09-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089

More information

Junos Space. Virtual Appliance Deployment and Configuration Guide. Release 14.1R2. Modified: 2015-08-14 Revision 2

Junos Space. Virtual Appliance Deployment and Configuration Guide. Release 14.1R2. Modified: 2015-08-14 Revision 2 Junos Space Virtual Appliance Deployment and Configuration Guide Release 14.1R2 Modified: 2015-08-14 Revision 2 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

WebApp Secure 5.5. Published: 2014-06-27. Copyright 2014, Juniper Networks, Inc.

WebApp Secure 5.5. Published: 2014-06-27. Copyright 2014, Juniper Networks, Inc. WebApp Secure 5.5 Published: 2014-06-27 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Access Control on EX4300 Switches Release 13.2X50 Published: 2014-03-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos Space. Network Monitoring. Published: 2013-05-06. Copyright 2013, Juniper Networks, Inc.

Junos Space. Network Monitoring. Published: 2013-05-06. Copyright 2013, Juniper Networks, Inc. Junos Space Network Monitoring Published: 2013-05-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Spotlight Secure. Spotlight Secure Connector Getting Started Guide. Modified: 2015-06-04. Copyright 2015, Juniper Networks, Inc.

Spotlight Secure. Spotlight Secure Connector Getting Started Guide. Modified: 2015-06-04. Copyright 2015, Juniper Networks, Inc. Spotlight Secure Spotlight Secure Connector Getting Started Guide Modified: 2015-06-04 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Voice over IP. Published: 2012-02-15. Copyright 2012, Juniper Networks, Inc.

Voice over IP. Published: 2012-02-15. Copyright 2012, Juniper Networks, Inc. Voice over IP Published: 2012-02-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted

More information

Junos OS. Processing Overview for Security Devices. Release 12.1X44-D10. Published: 2014-07-07. Copyright 2014, Juniper Networks, Inc.

Junos OS. Processing Overview for Security Devices. Release 12.1X44-D10. Published: 2014-07-07. Copyright 2014, Juniper Networks, Inc. Junos OS Processing Overview for Security Devices Release 12.1X44-D10 Published: 2014-07-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos OS. Firewall Filters Configuration Guide. Release 12.3. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc.

Junos OS. Firewall Filters Configuration Guide. Release 12.3. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc. Junos OS Firewall Filters Configuration Guide Release 12.3 Published: 2012-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product

More information

Junos Space. Network Monitoring. Release 13.3. Published: 2014-10-19. Copyright 2014, Juniper Networks, Inc.

Junos Space. Network Monitoring. Release 13.3. Published: 2014-10-19. Copyright 2014, Juniper Networks, Inc. Junos Space Network Monitoring Release 13.3 Published: 2014-10-19 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Cloud Analytics Engine Compute Agent API Reference

Cloud Analytics Engine Compute Agent API Reference Cloud Analytics Engine Compute Agent API Reference Release 14.1X53 Published: 2015-01-22 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper

More information

WinCollect User Guide

WinCollect User Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

Junos OS. Flow Monitoring Feature Guide for Routing Devices. Release 14.1. Published: 2014-09-27. Copyright 2014, Juniper Networks, Inc.

Junos OS. Flow Monitoring Feature Guide for Routing Devices. Release 14.1. Published: 2014-09-27. Copyright 2014, Juniper Networks, Inc. Junos OS Flow Monitoring Feature Guide for Routing Devices Release 14.1 Published: 2014-09-27 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Space Network Management Platform

Junos Space Network Management Platform Junos Space Network Management Platform Monitoring and Troubleshooting Guide Release 15.1 Modified: 2015-09-09 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Administration Guide IBM Security QRadar SIEM Version 7..0 MR Administration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 07. Copyright

More information

Junos Space. Network Monitoring. Release 14.1. Modified: 2015-08-09. Copyright 2015, Juniper Networks, Inc.

Junos Space. Network Monitoring. Release 14.1. Modified: 2015-08-09. Copyright 2015, Juniper Networks, Inc. Junos Space Network Monitoring Release 14.1 Modified: 2015-08-09 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Junos Space. Network Management Platform Monitoring and Troubleshooting Guide. Release 13.3. Published: 2014-03-10

Junos Space. Network Management Platform Monitoring and Troubleshooting Guide. Release 13.3. Published: 2014-03-10 Junos Space Network Management Platform Monitoring and Troubleshooting Guide Release 13.3 Published: 2014-03-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

VoIP Services in an SRC-Managed Network

VoIP Services in an SRC-Managed Network VoIP Services in an SRC-Managed Network Modified: 2015-06-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Log Sources Users Guide Release 2014.2 Modified: 2015-11-30 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Junos Space. Service Now User Guide. Release 13.1. Published: 2013-06-29. Copyright 2013, Juniper Networks, Inc.

Junos Space. Service Now User Guide. Release 13.1. Published: 2013-06-29. Copyright 2013, Juniper Networks, Inc. Junos Space Service Now User Guide Release 13.1 Published: 2013-06-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes

More information

Complete Hardware Guide for EX4300 Ethernet Switches

Complete Hardware Guide for EX4300 Ethernet Switches Complete Hardware Guide for EX4300 Ethernet Switches Modified: 2015-06-23 Revision 6 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper

More information

Junos OS. Flow Monitoring Feature Guide for Routing Devices. Release 13.2. Published: 2014-01-09. Copyright 2014, Juniper Networks, Inc.

Junos OS. Flow Monitoring Feature Guide for Routing Devices. Release 13.2. Published: 2014-01-09. Copyright 2014, Juniper Networks, Inc. Junos OS Flow Monitoring Feature Guide for Routing Devices Release 13.2 Published: 2014-01-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Routing Policy and Packet Filtering for EX Series Switches Release 13.2X50 Published: 2013-09-30 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service Client-Side Changes Release 7.3 Published: 2012-10-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Juniper Networks Network and Security Manager

Juniper Networks Network and Security Manager Juniper Networks Network and Security Manager CentOS Upgrade Guide Release 2012.2 Modified: 2015-07-20 Revision 4 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Adaptive Log Exporter Users Guide

Adaptive Log Exporter Users Guide Security Threat Response Manager Release 2012.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2012-05-30 Copyright Notice Copyright 2012

More information

Junos OS. Installation and Upgrade Guide. Release 14.1. Modified: 2016-06-17. Copyright 2016, Juniper Networks, Inc.

Junos OS. Installation and Upgrade Guide. Release 14.1. Modified: 2016-06-17. Copyright 2016, Juniper Networks, Inc. Junos OS Installation and Upgrade Guide Release 14.1 Modified: 2016-06-17 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,

More information

Junos OS. Firewall User Authentication for Security Devices. Release 12.1X44-D10. Published: 2013-01-06. Copyright 2013, Juniper Networks, Inc.

Junos OS. Firewall User Authentication for Security Devices. Release 12.1X44-D10. Published: 2013-01-06. Copyright 2013, Juniper Networks, Inc. Junos OS Firewall User Authentication for Security Devices Release 12.1X44-D10 Published: 2013-01-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Activity Monitor. Published: 2014-12-10. Copyright 2014, Juniper Networks, Inc.

Activity Monitor. Published: 2014-12-10. Copyright 2014, Juniper Networks, Inc. Activity Monitor Published: 2014-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted

More information

Load Balancing. Published: 2012-11-27. Copyright 2012, Juniper Networks, Inc.

Load Balancing. Published: 2012-11-27. Copyright 2012, Juniper Networks, Inc. Load Balancing Published: 2012-11-27 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy SNMP Engine, developed

More information

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide

IBM Security QRadar Vulnerability Manager Version 7.2.1. User Guide IBM Security QRadar Vulnerability Manager Version 7.2.1 User Guide Note Before using this information and the product that it supports, read the information in Notices on page 61. Copyright IBM Corporation

More information

Junos Space Security Director

Junos Space Security Director Junos Space Security Director Logging and Reporting Getting Started Guide Release 14.1 R2 Published: 2015-01-27 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Firefly Suite. Firefly Host Cloud Security SDK. Release 6.0. Published: 2014-04-21. Copyright 2014, Juniper Networks, Inc.

Firefly Suite. Firefly Host Cloud Security SDK. Release 6.0. Published: 2014-04-21. Copyright 2014, Juniper Networks, Inc. Firefly Suite Firefly Host Cloud Security SDK Release 6.0 Published: 2014-04-21 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Release Notes: Junos Space Service Automation 13.3R4

Release Notes: Junos Space Service Automation 13.3R4 Release Notes: Junos Space Service Automation 13.3R4 Release 13.3R4 September 2014 Contents Junos Space Service Automation Release Notes........................... 2 New Features in Junos Space Service

More information

After you have created your text file, see Adding a Log Source.

After you have created your text file, see Adding a Log Source. TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular

More information

Load Balancing. Published: 2013-12-09. Copyright 2013, Juniper Networks, Inc.

Load Balancing. Published: 2013-12-09. Copyright 2013, Juniper Networks, Inc. Load Balancing Published: 2013-12-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen,

More information

Managing Vulnerability Assessment

Managing Vulnerability Assessment Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Junos OS. MPLS Configuration Guide for Security Devices. Release 12.1. Published: 2012-03-07. Copyright 2012, Juniper Networks, Inc.

Junos OS. MPLS Configuration Guide for Security Devices. Release 12.1. Published: 2012-03-07. Copyright 2012, Juniper Networks, Inc. Junos OS MPLS Configuration Guide for Security Devices Release 12.1 Published: 2012-03-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

MX Series Routers as a Service Node in an SRC-Managed Network

MX Series Routers as a Service Node in an SRC-Managed Network MX Series Routers as a Service Node in an SRC-Managed Network Published: 2014-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches System Monitoring on EX Series Switches Release 12.1 Published: 2012-06-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Junos OS for EX Series Ethernet Switches

Junos OS for EX Series Ethernet Switches Junos OS for EX Series Ethernet Switches Security on EX4600 Release 13.2X51 Published: 2014-07-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos OS. Layer 2 Bridging and Transparent Mode for Security Devices. Release 12.1X44-D10. Published: 2014-07-18

Junos OS. Layer 2 Bridging and Transparent Mode for Security Devices. Release 12.1X44-D10. Published: 2014-07-18 Junos OS Layer 2 Bridging and Transparent Mode for Security Devices Release 12.1X44-D10 Published: 2014-07-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Juniper Secure Analytics Release Notes

Juniper Secure Analytics Release Notes Juniper Secure Analytics Release Notes 2014.5 February 2016 Juniper Networks is pleased to introduce JSA 2014.5. Juniper Secure Analytics (JSA) 2014.5 Release Notes provides new features, known issues

More information

Pulse Policy Secure. Device Access Management Framework Feature Guide. Product Release 5.1. Published: 2015-02-10. Document Revision 1.

Pulse Policy Secure. Device Access Management Framework Feature Guide. Product Release 5.1. Published: 2015-02-10. Document Revision 1. Pulse Policy Secure Device Access Management Framework Feature Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700

More information

Junos OS. Application Tracking. Release 12.1X44-D10. Published: 2014-12-09. Copyright 2014, Juniper Networks, Inc.

Junos OS. Application Tracking. Release 12.1X44-D10. Published: 2014-12-09. Copyright 2014, Juniper Networks, Inc. Junos OS Application Tracking Release 12.1X44-D10 Published: 2014-12-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks,

More information

Kaspersky Security Center Web-Console

Kaspersky Security Center Web-Console Kaspersky Security Center Web-Console User Guide CONTENTS ABOUT THIS GUIDE... 5 In this document... 5 Document conventions... 7 KASPERSKY SECURITY CENTER WEB-CONSOLE... 8 SOFTWARE REQUIREMENTS... 10 APPLICATION

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Log Sources Users Guide Release 2014.6 Modified: 2016-04-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Tuning Guide. Release 2014.1. Juniper Secure Analytics. Juniper Networks, Inc. www.juniper.net

Tuning Guide. Release 2014.1. Juniper Secure Analytics. Juniper Networks, Inc. www.juniper.net Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-12-05 Copyright Notice Copyright 2014 Juniper

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.2 Published: 2012-06-27 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Load Balancing. Published: 2014-05-02. Copyright 2014, Juniper Networks, Inc.

Load Balancing. Published: 2014-05-02. Copyright 2014, Juniper Networks, Inc. Load Balancing Published: 2014-05-02 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen,

More information