Migrating Log Manager to JSA



Similar documents
Adaptive Log Exporter Service Update

REPLACING THE SSL CERTIFICATE

Using the Content Management Tool

STRM Log Manager Administration Guide

Installing JSA Using a Bootable USB Flash Drive

NSM Plug-In Users Guide

Managing Vulnerability Assessment

WinCollect User Guide

Adaptive Log Exporter Users Guide

Log Sources Users Guide

After you have created your text file, see Adding a Log Source.

QUICK START GUIDE CX-MC200LE-VZ

STRM Log Manager Users Guide

TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server

Tuning Guide. Release Juniper Secure Analytics. Juniper Networks, Inc.

ADMINISTRATOR S GUIDE

Configuring Offboard Storage Guide

Wireless Travel Mouse with 5-Buttons User Manual

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

WBSn Family. FW Upgrade

By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.

Installation Guide USB Laptop KVM Switch GCS661U

Setting up an icap Server for ISG- 1000/2000 AV Support

RocketStor SMART RAID

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Installation Guide 1-port USB 2.0 Print Server 1 GPSU21

Juniper Secure Analytics

Juniper Secure Analytics

Identity-Based Traffic Logging and Reporting

High Speed File Share Cable USER GUIDE

This technical note provides information on how to customize your notifications. This section includes the following topics:

File Share Cable USER GUIDE. for Mac. ONE YEAR LIMITED WARRANTY N2953

Juniper Secure Analytics

User Manual. PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400. PePWave Mesh Connector Indoor Series: MC 200, E200, 400

FortiFone QuickStart Guide for FON-370i

Juniper Secure Analytics

Net USER GUIDE MEDIA SHARING DEVICE

etoken Single Sign-On

LabelWriter. Print Server. User Guide

Dual Ports Serial PC Card User Manual

Targus Bluetooth Keyboard for Tablets

TL-PS310U Single USB 2.0 Port MFP and Storage Server

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

FortiFone QuickStart Guide for FON-670i and FON-675i

Juniper Networks Management Pack Documentation

SmartDock for Xperia ion User guide

USB 2.0 Peripheral Switch USER MANUAL US221A / US421A

RocketRAID 600 Series 6Gb/s SATA RAID Host Adapters (RocketRAID 620 and RocketRAID 622)

mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start

User Manual USB Laptop KVM Switch. GCS661U Part No. M1069

Laser Wireless Rechargeable Mouse. User s Manual

Implementation Consulting

Skyus 3G. Quick Start Guide Verizon

SanDisk Connect Wireless Flash Drive QUICK START GUIDE

What is Bitdefender BOX?

1394 CardBus Quick Installation Guide

Wireless Mouse USER GUIDE. for Mac. ONE YEAR LIMITED WARRANTY N2953

Juniper Secure Analytics

Getting Started. Table of Contents. Quick User Guide - English

Rocket 640L/644L 6Gb/s SATA Host Adapter Quick Installation Guide

ES-3305P V2 / ES-3308P V2. Quick Installation Guide / v1.0

SMART Response PE. Quick Start Guide. Safety and Compliance Information...2. Compliance...2. What s in the Box?...3. Environmental Considerations...

Congratulations on your HomePortal purchase. To install your HomePortal and configure your home network, follow these steps.

TECHNICAL NOTE INSTALLING AND CONFIGURING ALE USING A CLI. Installing the Adaptive Log Exporter

ASUS GX900 Gaming Mouse

Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: Copyright 2016, Juniper Networks, Inc.

Package Checklist. Overview. Features. USB Data Link Cable User s Manual. USB Data Link Cable User s Manual 1

If anything is damaged or missing, contact your dealer.

Wireless Alarm System. Alarm Siren. User s Manual. Choice ALERT. Control all Sensors & accessories from one location

DVI Video Splitter USER MANUAL VS-162 / VS-164

Laptop USB KVM Switch USER MANUAL CS661

Meridian 1 Meridian 1 Attendant PC LAN Interface Installation Guide

NEC SIP DECT SOLUTIONS ADMINISTRATOR GUIDE

Avaya 9400 Series Digital Deskphone User Guide for Avaya Aura Communication Manager

2GB MP3 Player USER GUIDE

User manual. Your best protection against theft and loss. (Android) Made for

QUICK INSTALLATION. 8-Port Telephony Gateway. Model: SPA8000

Verbatim PowerBay Single USB and esata External Hard Drive Version 1.00

Spotlight Management Pack for SCOM

Dell Active Pen Series. User s Guide

USB 2.0 to 10/100Mbps Ethernet Adapter UE User Manual

Introduction to Junos Space Network Director

DELORME. Getting Started with. Earthmate GPS BT-20. Bluetooth

Eclipse 180 User s Manual

iosafe Solo External Hard Drive

Duplex ID Card & License Scanner. User Guide

AG MacOS Standalone Array Client Administration Guide

USB to IDE or SATA Adapter

Installation Guide. RAID 5 esata 3Gbps 2 external port Low profi le PCI Express card. GICe702S3R5W6 PART NO. M0557

Usage, Installation, Warranty and Service Information

CONSOLE REMOTE I /O AC 9V

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision , Juniper Networks, Inc.

Dual-Cool Notebook Cooler Pad. User s Manual

Configuring and Implementing A10

User guide. Miracast Wireless Display IM10

Cloud Traveler. Manual. Portable Wireless Router/Hotspot APP

IEEE b WLAN PC Card

Transcription:

Juniper Log Manager Release 2014.4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-03-02

Copyright Notice Copyright 2015 Juniper Networks, Inc. All rights reserved. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. The following terms are trademarks or registered trademarks of other companies: Java TM and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. FCC Statement The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense. The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed in accordance with Juniper Networks installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Consult the dealer or an experienced radio/tv technician for help. Connect the equipment to an outlet on a circuit different from that to which the receiver is connected. Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device. Disclaimer THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT, SUBJECT TO THE MODIFICTAIONS SET FORTH BELOW ON THIS PAGE, ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY. Release 2014.4 Copyright 2015, Juniper Networks, Inc. All rights reserved. Printed in USA. Revision History March 2015 The information in this document is current as of the date listed in the revision history. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at http://www.juniper.net/support/eula.html, as modified by the following text, which shall be treated under the EULA as an Entitlement Document taking precedence over any conflicting provisions of such EULA as regards such software: As regards software accompanying the STRM products (the Program ), such software contains software licensed by Q1 Labs and is further accompanied by third-party software that is described in the applicable documentation or materials provided by Juniper Networks. 2

For the convenience of Licensee, the Program may be accompanied by a third party operating system. The operating system is not part of the Program, and is licensed directly by the operating system provider (e.g., Red Hat Inc., Novell Inc., etc.) to Licensee. Neither Juniper Networks nor Q1 Labs is a party to the license between Licensee and the third party operating system provider, and the Program includes the third party operating system AS IS, without representation or warranty, express or implied, including any implied warranty of merchantability, fitness for a particular purpose or non-infringement. For an installed Red Hat operating system, see the license file: /usr/share/doc/redhat-release-server-6server/eula. By downloading, installing or using such software, you agree to the terms and conditions of that EULA as so modified. 3

4

CONTENTS 1 MIGRATING LOG MANAGER TO JSA Applying a JSA License Key............................................ 7 Added Features...................................................... 8 Features Changed or Removed.......................................... 8

1 MIGRATING LOG MANAGER TO JSA This technical note provides information on migrating your Log Manager system to Juniper Secure Analytics (JSA). Backup your data before you begin a software migration. For more information on backup and recovery, see the Log Manager Administration Guide. Applying a JSA License Key To migrate your Log Manager software to JSA, you must obtain a JSA license key. Before you begin Download or save the JSA license key to your desktop system. Select one of the following options for assistance with your license key: To obtain a new or updated license key, contact your local sales representative. For all other technical issues, please contact Juniper Customer Support. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Procedure Click the Admin tab. On the navigation menu, click System Configuration. From the System Configuration navigation menu, click the icon. From the System and License Management window, select the Console containing the Log Manager license key. From the Actions menu, select Manage License. From the Current License Details window, click Browse beside the New License Key File box. From the File Upload window, locate and select the JSA license key. Click Open. Click Save.

8 MIGRATING LOG MANAGER TO JSA Step 10 On the System and License Management window, click Deploy License Key. Results The license key information is updated in your deployment. Added Features New features are added when migrating Log Manager to JSA. Table 1-1 describes the new features for the migration from Log Manager to JSA. Table 1-1 New Features Added feature New Network Activity Tab New Offenses Tab Enhanced Rules Tab New Assets Tab Enhanced Reports Tab Enhanced Dashboard Tab Description Allows you to view and manage network activity on your network. Allows you to view and manage offenses, which are alerts that notify you of suspicious network or log activity. Provides new rule tests and responses for testing both network and log activity. Allows you to view and manage assets and vulnerabilities on your network. Provides additional report types, including Asset Vulnerabilities, Flows, Top Source IPs, Top Destination IPs, and Top Offenses. Allows you to manage multiple dashboard views and provides new dashboard items related to offenses, sources and destinations. For more information on using JSA, see the Juniper Secure Analytics Users Guide and the Juniper Secure Analytics Administration Guide. Features Changed or Removed results in several changes to the interface and customized preferences.

Features Changed or Removed 9 Saved searches Using Log Manager and JSA you can create custom search criteria. The search feature enables you to create saved search criteria to display only the event data matching your search criteria. When you migrate Log Manager to JSA, your saved search criteria is removed. For more information on saved searches, see the Juniper Secure Analytics Users Guide. Reports Tab Using Log Manager and JSA you can create custom reports. The Report Wizard enables you to generate reports that display data associated with saved search criteria. When you migrate Log Manager to JSA, saved custom search criteria is removed, therefore, reports that use the removed custom saved search criteria no longer function. Previously generated reports are available after migrating Log Manager to JSA. For more information on the Reports tab, see the Juniper Secure Analytics Users Guide. Custom Event Rules Using Log Manager and JSA you can create custom event rules that allow JSA to test event logs for suspicious activity. When you migrate Log Manager to JSA, your custom event rules are removed. For more information regarding custom rules, see the Configuring Rules section of the Juniper Secure Analytics Administration Guide.