Example: Using Screen Reports to Identify Attack Trends
In this example, you are a security administrator in the network operations center
responsible for tracking potential network attacks. You daily generate and track an
"Attacks By Severity" report.
Over time, you notice that the number of critical attacks has increased 20 percent. To
verify this, you generate an "Attacks over Time" report for the past 30 days.
The report indicates a recent increase in attacks detected by your firewall. You can
generate "Top Attacks", "Top Attackers", and "Top Targets" reports to further investigate
the nature and assess the risk of these attacks.
For details on generating and configuring these reports, refer to the
Network and Security
Manager Online Help
.
Example: Using DI Reports to Detect Application Attacks
In this example, you are a security analyst responsible for tracking potential deep
inspection attacks. You routinely generate an "Attacks By Severity" report daily to track
and identify potential attacks.
One day, you notice a significant increase in the number of critical attacks detected by
the deep inspection rules you have implemented in your Security Policy. You then generate
a "Top Attackers" report for the last day.
The report indicates an IP address as the top attacker for all the DI attacks that you have
been tracking. You recognize the IP address as an external server that is running a service
using a nonstandard protocol. Although the traffic is not malicious, it happens to match
a malicious signature anomaly that you have configured in your DI policy. You can then
revise your policy rules to reclassify this traffic.
For details on generating and configuring these reports, refer to the
Network and Security
Manager Online Help
.
Using the Watch List
NSM lets you create and configure both a destination and a source watch list. The
Destination Watch List contains key hosts within the network against which a
proportionally large number of logs is recorded. The Source Watch List contains key hosts
outside the network that are sending a large number of log records and are therefore
suspected or known sources of attacks on your network.
The watch lists are convenient ways to create a list of source or destination hosts to use
as a filter in:
•
Log Viewer—Includes logs with destination or source watch lists in a query filter.
•
Log Investigator—Investigates logs with destination or source watch lists as data point
sources.
•
Report Manager—Includes custom reports for destination and source watch lists.
829
Copyright © 2010, Juniper Networks, Inc.
Chapter 20: Reporting
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...