Table 112: Screen Reports
(continued)
Description
Report
A summary of when attacks are detected by the firmware on your security
device
Screen Attacks over
Time
Where attacks originate from most frequently
Top Screen
Attackers
Which hosts on your network are the most frequent targets of attackers
for firewall attacks
Top Screen Targets
Administrative Reports
Table 113 on page 804 lists and describes reports in NSM that provide information
specifically for administrators.
Table 113: Administrative Reports
Description
Report
The total number of log entries that were flagged by an administrator in
the Log Viewer according to the predefined flag type set. You can flag
log events as High, Medium, Low, Closed, False Positive, Assigned,
Investigate, Follow-Up, or Pending. You can use the Logs by User-set
Flag report to quickly identify log events of specific interest.
Logs by User-set Flag
The total number of log entries generated by specific rules in your
ScreenOS/DI policies. You can use the Top Rules report to identify those
rules that are generating the most log events. This enables you to better
optimize your rulebases by identifying those rules that are most and least
effective. You can then modify or remove those rules from your security
policies.
Top FW/VPN Rules
UAC Reports
Table 114 on page 804 lists and describes those reports in NSM that provide information
about Unified Access Control (UAC) session logs.
Table 114: UAC Reports
Description
Report
Total number of UAC session logs over the last 7 days.
Time graph of UAC
session logs
20 destination IP addresses that have most frequently appeared on UAC
logs over the last 7 days.
Top 20 Destinations
20 Infranet enforcer devices that have most frequently appeared on UAC
logs over the last 7 days.
Top 20 Enforcers
(devices) for UAC logs
Ten user authentication failures that have mostly frequently appeared
on UAC logs over the last 24 hours.
Top 10 auth failures for
user@realm
Copyright © 2010, Juniper Networks, Inc.
804
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...