JSA Vulnerability Manager and JSA Risk Manager
JSA Vulnerability Manager 7.3.1 introduces custom risks and enhanced support for CIS benchmarks. JSA Risk Manager 7.3.1 migrates features from Configuration Source Management to the Configuration Monitor and improves topology searches and views.
JSA Vulnerability Manager Custom Risk classification
Classify vulnerabilities with Custom Risk to prioritize the vulnerabilities that pose most risk to your enterprise. Override a vulnerability's risk with your own risk classification based on individual requirements, and add comments to describe why you are changing the classification. For example, if a new internal policy requires all assets to disable SMBv1, you can raise the risk to Critical for all SMBv1 required vulnerabilities.
For more information, see the Juniper Secure Analytics Vulnerability Manager User Guide.
JSA Risk Manager migration from Configuration Source Management to Configuration Monitor
Several features are migrated from Configuration Source Management to Configuration Monitor: add a new device, delete a device, back up a device, and discover devices in the Configuration Monitor. This migration is in preparation for when Google Chrome removes full support for Adobe Flash, and is the first stage in the removal of Flash dependency from JSA Risk Manager.
For more information, see the Juniper Secure Analytics Risk Manager User Guide.
Improved JSA Risk Manager topology searches and views
Each topology search opens a tabbed view, and results are cached for improved topology retrieval, resulting in faster processing time.
For more information, see the Juniper Secure Analytics Risk Manager User Guide.
Manager User Guide. Enhanced
Added CIS Benchmarks profile support for the following platforms:
Windows 2012 R2
Red Hat Enterprise Linux 7
Solaris 10
Solaris 11
Solaris 11.1
Solaris 11.2
Ubuntu Linux 14
Ubuntu Linux 15
CentOS Linux 6
CentOS Linux 7