Help Center User GuideGetting StartedFAQ
User Guide
Getting Started

About the Signature Database Page

To access this page, select Administration > Signature Database.

Use the Signature Database page to install the active signature database, which contains intrusion prevention system (IPS) and application signatures, on one or more devices. The signature database contains definitions of attacks and application, which are used in defining IPS profile rules and application firewall rules. These attack objects and groups are designed to detect known attack patterns and protocol anomalies within the network traffic.

Tasks You Can Perform

You can perform the following task from this page:

Field Descriptions

Table 329 describes the fields on this page.

Table 329: Fields on the Signature Database Page



Active Database

Database Version

Version of signature database.

Publish Date

Date and time (YYYY-MM-DD HH:MM:SS 24-hour format) when the signature database was published.

Installed Device Count

Number of devices on which the signature database was successfully installed.


Version numbers of the detector engines associated with the signature database.

Click the detector-versions link to view the detector details. The Detector Details for Signature-Database-Version page appears displaying (in a table) the platform, OS version, and version of the detectors for the signature database. Click Close to return to the Signature Database page.


Click the Install on device link to install the signatures on one or more devices.

The Install Signatures page appears. See Installing Signatures.

Note: This field appears only for users with the Tenant Administrator role.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      

Additional Comments

800 characters remaining

May we contact you if necessary?


Need product assistance? Contact Juniper Support