Table 112: Screen Reports
(continued)
Description
Report
A summary of when attacks are detected by the firmware on your security
device
Screen Attacks over
Time
Where attacks originate from most frequently
Top Screen
Attackers
Which hosts on your network are the most frequent targets of attackers
for firewall attacks
Top Screen Targets
Administrative Reports
Table 113 on page 814 lists and describes reports in NSM that provide information
specifically for administrators.
Table 113: Administrative Reports
Description
Report
The total number of log entries that were flagged by an administrator in
the Log Viewer according to the predefined flag type set. You can flag
log events as High, Medium, Low, Closed, False Positive, Assigned,
Investigate, Follow-Up, or Pending. You can use the Logs by User-set
Flag report to quickly identify log events of specific interest.
Logs by User-set Flag
The total number of log entries generated by specific rules in your
ScreenOS/DI policies. You can use the Top Rules report to identify those
rules that are generating the most log events. This enables you to better
optimize your rulebases by identifying those rules that are most and least
effective. You can then modify or remove those rules from your security
policies.
Top FW/VPN Rules
UAC Reports
Table 114 on page 814 lists and describes those reports in NSM that provide information
about Unified Access Control (UAC) session logs.
Table 114: UAC Reports
Description
Report
Total number of UAC session logs over the last 7 days.
Time graph of UAC
session logs
20 destination IP addresses that have most frequently appeared on UAC
logs over the last 7 days.
Top 20 Destinations
20 Infranet enforcer devices that have most frequently appeared on UAC
logs over the last 7 days.
Top 20 Enforcers
(devices) for UAC logs
Ten user authentication failures that have mostly frequently appeared
on UAC logs over the last 24 hours.
Top 10 auth failures for
user@realm
Copyright © 2010, Juniper Networks, Inc.
814
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...