Help Center User GuideGetting Started
 
X
User Guide
Getting Started
Contents  

Reports

Purpose

Use the Reports menu to generate reports on demand. There are several predefined reports listed in this page, see Table 275. The generated report is displayed in HTML format. You can group multiple reports and generate a consolidated report.

Starting in Junos OS Release 18.1R1, the following predefined group of reports are available.

Note A few pre-existing reports that were available in the previous Junos OS releases are grouped within these reports.

Starting in Junos OS Release 18.4R1, Threat Assessment Report is available as a predefined group of reports.

Note Starting in Junos OS Release 19.1R1, Threat Assessment report content will support the following charts:

  • Top Web Categories for Security High—Displays only high severities and top 10 web categories.

  • Top Web Categories—Displays top 10 web categories.

  • Top Users Accessing Risky Websites—Displays top 10 values.

  • Top URL Categories for Security Risk (High and Medium)—Displays both high and medium severities and top 10 values.

  • Top URL Categories for Productivity Loss—Displays top 10 values.

  • Top URL Categories for Legal Liability—Displays top 10 values.

Table 275 lists the predefined group reports and the supported users.

Note Starting in Junos OS Release 19.1R1, logical system and tenant support the reports listed in Table 275 only for SRX1500, SRX4100, SRX4200, and SRX4600.

Table 275: Predefined Group Reports and Supported Users

Report Name

Report Content

Root

Logical System

Tenant

Threat Assessment Report

Executive Summary

Yes

Yes

Yes

Application Risk Assessment

Yes

Yes

Yes

Threat & Malware Assessment

Yes

Yes

Yes

User and Web Access Assessment

Yes

Yes

Yes

Application and User Usage

Top High Risk Applications by Bandwidth

Yes

Yes

Yes

Top High Risk Applications By Count

Yes

Yes

Yes

Top Categories By Bandwidth

Yes

Yes

Yes

Top Applications By Bandwidth

Yes

Yes

Yes

Top Categories By Count

Yes

Yes

Yes

Top Applications By Count

Yes

Yes

Yes

Top Users Of High Risk Applications By Bandwidth

Yes

Yes

Yes

Top Users By Bandwidth

Yes

Yes

Yes

High Risk Applications Allowed Per User

Yes

Yes

Yes

High Risk Applications Blocked Per User

Yes

Yes

Yes

Top Talkers

Top Source IPs by Bandwidth

Yes

Yes

Yes

Top Destination IPs by Bandwidth

Yes

Yes

Yes

Top Source IPs by Session

Yes

Yes

Yes

Top Destination IPs by Session

Yes

Yes

Yes

Top Users By Bandwidth

Yes

Yes

Yes

Top Users By Count

Yes

Yes

Yes

IPS Threat Environment

IPS Attacks by Severity Over Time

Yes

Yes

No

Total IPS Attacks by Severity

Yes

Yes

No

Top IPS Categories Blocked

Yes

Yes

No

Top IPS Attacks Blocked

Yes

Yes

No

Top Targeted Hosts by IP

Yes

Yes

No

Top Targeted Hosts by User

Yes

Yes

No

URL Report

Top URLs by Bandwidth

Yes

Yes

No

Top URLs by Count

Yes

Yes

No

Top URL Categories by Bandwidth

Yes

Yes

No

Top URL Categories by Count

Yes

Yes

No

Total URLs Blocked Over Time

Yes

Yes

No

Top Blocked URLs

Yes

Yes

No

Top Blocked URL Categories by Count

Yes

Yes

No

Users With Most Blocked URLs

Yes

Yes

No

Viruses Blocked

Total Viruses Blocked Over Time

Yes

Yes

No

Top Viruses Blocked

Yes

Yes

No

Virus: Top Blocked

Virus: Top Blocked

Yes

Yes

No

Top Firewall Events

Top Firewall Events

Yes

Yes

Yes

Top Firewall Deny Destinations

Top Firewall Deny Destinations

Yes

Yes

Yes

Top Firewall Service Deny

Top Firewall Service Deny

Yes

Yes

Yes

Top Firewall Denies

Top Firewall Denies

Yes

Yes

Yes

Top IPS Events

Top IPS Events

Yes

Yes

No

Top Anti-spam Detected

Top Anti-spam Detected

Yes

Yes

No

Top Screen Attackers

Top Screen Attackers

Yes

Yes

Yes

Top Screen Victims

Top Screen Victims

Yes

Yes

Yes

Top Screen Hits

Top Screen Hits

Yes

Yes

Yes

Top Firewall Rules

Top Firewall Rules

Yes

Yes

Yes

Top Firewall Deny Sources

Top Firewall Deny Sources

Yes

Yes

Yes

Top IPS Attack Sources

Top IPS Attack Sources

Yes

Yes

No

Top IPS Attack Destinations

Top IPS Attack Destinations

Yes

Yes

No

Top IPS Rules

Top IPS Rules

Yes

Yes

No

Top Web Apps

Top Web Apps

Yes

Yes

No

Top Roles

Top Roles

Yes

Yes

No

Top Applications Blocked

Top Applications Blocked

Yes

Yes

No

Top URLs by User

Top URLs by User

Yes

Yes

No

Top Source Zone by Volume

Top Source Zone by Volume

Yes

Yes

Yes

Top Applications by User

Top Applications by User

Yes

Yes

Yes

Top Botnet Threats By Source Address via IDP Logs

Top Botnet Threats By Source Address via IDP Logs

Yes

Yes

No

Top Botnet Threats by Destination Address via IDP Logs

Top Botnet Threats by Destination Address via IDP Logs

Yes

Yes

No

Top Botnet Threats by Threat Severity via IDP Logs

Top Botnet Threats by Threat Severity via IDP Logs

Yes

Yes

No

Top Malware Threats by Source Address via IDP Logs

Top Malware Threats by Source Address via IDP Logs

Yes

Yes

No

Top Malware Threats by Destination Address via IDP Logs

Top Malware Threats by Destination Address via IDP Logs

Yes

Yes

No

Top Malware Threats by Threat Severity via IDP Logs

Top Malware Threats by Threat Severity via IDP Logs

Yes

Yes

No

Top Blocked Applications via Webfilter Logs

Top Blocked Applications via Webfilter Logs

Yes

Yes

No

Top Permitted Application Subcategories by Volume via Webfilter Logs

Top Permitted Application Subcategories by Volume via Webfilter Logs

Yes

Yes

No

Top Permitted Application Subcategories by Count via Webfilter Logs

Top Permitted Application Subcategories by Count via Webfilter Logs

Yes

Yes

No

Action

To view and download reports, click Reports in the top level menu.

Predefined report names, their description, and type is listed in a grid format.

You can select single or multiple report names or all the predefined report names and generate a consolidated report.

After you select the report names, click Generate Report.

The Report Title popup window opens.

Enter a Name for your report. You may enter a description. You must select the number of records you want in the report by selecting a number in Show Top.

In the Show Details section, Select All or Top Selected to display all the details or only the top selected details in the report.

Starting in Junos OS Release 18.1R1, you can select a predefined time span. In the Time Span list, select the predefined time span from where you want the report generated. You may also enter a custom time span by selecting Custom from the list.

You can order your reports by clicking the arrow next to Sorting Options. You may select to display reports from Largest to Smallest or Smallest to Largest details.

Click Save. The report is generated in HTML format and prompts you to save the file.

You can view the report by opening it from the location where you saved it or by opening it from the file icon listed at the bottom of the Reports page.

The opening page of the report shows the time when it was generated. A table of contents is generated if you have selected multiple reports. Each report displays information in a bar graph and tabular format. If there is no data to be represented, the report says -No Data Available-.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit