•
FW/VPN—Reports that summarize log and alarm data generated by the managed
security devices in your network.
•
DI/IDP—Reports that provide data on deep inspection (DI) and intrusion detection and
prevention (IDP) attacks.
•
Screen—Reports that provide data on Screen attacks detected by the firmware on the
managed security devices in your network.
•
Administrative—Reports specifically designed to help system administrators track and
manage log incidents and security rules.
•
UAC Reports—Reports that provide data on Unified Access Control (UAC) sessions.
•
Profiler Reports—Reports that help system administrators investigate and analyze
potential problems in the network and to resolve security incidents.
•
AVT—Reports that help system administrators track the volume of application traffic
in the managed network.
•
EX Switch Report—A report that provides configuration data on EX Series switches.
•
My Reports—All reports that you have saved or created as custom reports.
•
SSL/VPN Reports—Reports that provide data on Infranet Controller.
•
Shared Reports—All reports that you have saved or created that you want made
accessible to others in a domain.
Grouping these reports by type enables administrators and operations staff interested
in tracking and analyzing specific types of information to work only within the group of
reports that they need.
For details on each of the specific reports per group, see “Report Types” on page 811. For
additional details on each report type group, refer to the
Network and Security Manager
Online Help
.
Graphical Data Representation
You can use reports to view log data in both tabular and graphical form. The various
depictions of the data make it easier to identify trends and potential areas of risk. You
can also choose to view the data in either a horizontal bar graph or a pie chart.
Integration with Logs
Reports are also integrated with the Log Viewer and Log Investigator modules. By clicking
a data point depicted in a report, you can quickly drill down to access and view the specific
log entries presented in the report data. Refer to “Log Viewer Integration” on page 824 for
more information about how you can use reports and log entries together to further
analyze network events and attacks.
Central Access to Management Information
For network administrators and security analysts interested in tracking and identifying
potential network trends and attacks, Report Manager provides a single graphical view
into the network.
Copyright © 2010, Juniper Networks, Inc.
810
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...