Configuring Report Source Data
You can configure a report to one of the following log record columns: Action, Alert, Src
Addr, or Policy. Select the report source data by checking the appropriate check boxes
in the
Columns For Report
selection area. The data that you choose for the columns in
your report appear in the Y-axis of the graph.
Configuring a Report Time Period
You can configure a report to display all available data from either a specific date and
time or during a specific time interval.
For example, if you suspect that your network was attacked on September 15 at 6:00
PM, you could set the Starting At Time Period Duration report field in the options on a
Top Screen Attacks report to that time, then generate the report.
If you are not sure of the exact date or time of the attack, but know it occurred during the
past 2 days, set the Duration field in the Time Period Duration report options on a Top
Screen Attacks report to two days, then generate the report.
NOTE:
The data that you can display in each report is limited by the amount of log
information available.
Configuring the Data Point Count
Typically, the top 50 occurrences of each data type are displayed in each report. You can
configure a report to display more or fewer data points depending upon the level of detail
you need. For example, if you want to obtain a more precise view of the top occurrences
of events, you would configure a lower data point count (such as 25).
NOTE:
The minimum data point count that you can configure in all reports is 5; the
maximum data point count is 200.
Configuring the Chart Type
By default, each report depicts information in a horizontal bar chart. You can also configure
the report to depict information using a pie chart.
Sharing Your Custom Report
Use the
Save Report In
pull-down menu and select the
Shared Reports
option to specify
that you want to share your report across all domains.
Modifying Report Filters
You can also use report filters to reduce the amount of unwanted or unnecessary log
information compiled in each report. This makes it easier for you to focus on only the log
data of interest to you. You can specify criteria to filter your log data on any of the columns
that you have chosen to base the report.
813
Copyright © 2010, Juniper Networks, Inc.
Chapter 20: Reporting
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...