Sharing Your Custom Report
Use the
Save Report In
pull-down menu and select the
Shared Reports
option to specify
that you want to share your report across all domains.
Modifying Report Filters
You can also use report filters to reduce the amount of unwanted or unnecessary log
information compiled in each report. This makes it easier for you to focus on only the log
data of interest to you. You can specify criteria to filter your log data on any of the columns
that you have chosen to base the report.
For example, you are a security administrator that typically reviews the “Attacks by
Severity” report. You notice that critical attacks are on the rise. To track this more closely,
you can modify the log filter on the “Attacks by Severity” report so that the report only
displays critical attacks. To do this, select the “Attacks by Severity” report, and use
Set
Report Options
to access the
Log Filter
tab. In the
Log Filter
tab, select to filter on attacks,
and unselect all attacks except for those that are critical.
Configuring Report Processing Warnings
Each time you generate a report, it must perform a scan operation on a certain set of log
records in the log database. The total number of log records that a report operation
requires can have an adverse impact on your overall management performance. To
prevent extraordinarily lengthy report operations from impacting your overall system
performance, you can use the
Preferences
tool to configure NSM to display a warning
message before a report is to scan a certain threshold number of log records.
NOTE:
This setting also applies to the Dashboard and Log Viewer.
For example, set a warning message threshold at around 1,000,000 logs. To do this, use
the
Preferences
option in the
Tools
menu and select
Reports
. In the
New Preference
Settings
dialog box, click in the
Enable Warnings
check box and use the up and down
arrows to specify 1,000,000 as the number of
Maximum Records to Filter
.
After this preference is applied, a warning appears each time a report is set to perform
an operation requiring 1,000,000 log records to be scanned.
Saving Your Report Settings
After you have defined your custom reports, you can save the report settings as a custom
report. Saved reports are organized under the tree node named "Custom Reports".
Log Viewer Integration
Report Manager uses log data as the basis of all the information presented in each report.
Because of this, we recommend that you consider requirements for reporting as you
decide how many log entries you want to maintain and store.
Copyright © 2010, Juniper Networks, Inc.
824
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Page 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Page 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Page 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Page 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Page 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Page 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Page 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Page 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Page 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Page 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Page 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Page 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Page 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Page 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Page 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Page 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Page 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Page 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Page 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...