For example, you are a security administrator that typically reviews the “Attacks by
Severity” report. You notice that critical attacks are on the rise. To track this more closely,
you can modify the log filter on the “Attacks by Severity” report so that the report only
displays critical attacks. To do this, select the “Attacks by Severity” report, and use
Set
Report Options
to access the
Log Filter
tab. In the
Log Filter
tab, select to filter on attacks,
and unselect all attacks except for those that are critical.
Configuring Report Processing Warnings
Each time you generate a report, it must perform a scan operation on a certain set of log
records in the log database. The total number of log records that a report operation
requires can have an adverse impact on your overall management performance. To
prevent extraordinarily lengthy report operations from impacting your overall system
performance, you can use the
Preferences
tool to configure NSM to display a warning
message before a report is to scan a certain threshold number of log records.
NOTE:
This setting also applies to the Dashboard and Log Viewer.
For example, set a warning message threshold at around 1,000,000 logs. To do this, use
the
Preferences
option in the
Tools
menu and select
Reports
. In the
New Preference
Settings
dialog box, click in the
Enable Warnings
check box and use the up and down
arrows to specify 1,000,000 as the number of
Maximum Records to Filter
.
After this preference is applied, a warning appears each time a report is set to perform
an operation requiring 1,000,000 log records to be scanned.
Saving Your Report Settings
After you have defined your custom reports, you can save the report settings as a custom
report. Saved reports are organized under the tree node named "Custom Reports".
Log Viewer Integration
Report Manager uses log data as the basis of all the information presented in each report.
Because of this, we recommend that you consider requirements for reporting as you
decide how many log entries you want to maintain and store.
Viewing Logs From Report Manager
One key benefit of Report Manager’s tight integration with log entries is the ability to
quickly access the source log data presented in each report. To view the source log entries
in the Log Viewer for more detailed information about the report data, right-click a data
point in any report and select
Log Viewer
from the
View
menu. The source log entries
will appear in the Log Viewer.
NOTE:
You cannot save the view generated in the Log Viewer for use in a later UI session.
Copyright © 2010, Juniper Networks, Inc.
814
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...