Help Center User GuideGetting Started
 
X
User Guide
Getting Started
Contents  

About Reports Page

Overview

Use the Reports menu to generate reports on demand. There are several predefined reports listed in this page, see Table 295. The generated report is displayed in HTML format. You can group multiple reports and generate a consolidated report.

Logical system and tenant support the reports listed in Table 295 only for SRX1500, SRX4100, SRX4200, and SRX4600.

Table 295: Predefined Group Reports and Supported Users

Report Name

Root

Logical System Users

Tenant Users Support

Threat Assessment Report

Yes

Yes

Yes

Application and User Usage

Yes

Yes

Yes

Top Talkers

Yes

Yes

Yes

IPS Threat Environment

Yes

Yes

No

URL Report

Yes

Yes

Yes

Viruses Blocked

Yes

Yes

No

Virus: Top Blocked

Yes

Yes

No

Top Firewall Events

Yes

Yes

Yes

Top Firewall Deny Destinations

Yes

Yes

Yes

Top Firewall Service Deny

Yes

Yes

Yes

Top Firewall Denies

Yes

Yes

Yes

Top IPS Events

Yes

Yes

No

Top Anti-spam Detected

Yes

Yes

No

Top Screen Attackers

Yes

Yes

Yes

Top Screen Victims

Yes

Yes

Yes

Top Screen Hits

Yes

Yes

Yes

Top Firewall Rules

Yes

Yes

Yes

Top Firewall Deny Sources

Yes

Yes

Yes

Top IPS Attack Sources

Yes

Yes

Yes

Top IPS Attack Destinations

Yes

Yes

No

Top IPS Rules

Yes

Yes

No

Top Web Apps

Yes

Yes

No

Top Roles

Yes

Yes

No

Top Applications Blocked

Yes

Yes

No

Top URLs by User

Yes

Yes

No

Top Source Zone by Volume

Yes

Yes

Yes

Top Applications by User

Yes

Yes

Yes

Top Botnet Threats By Source Address via IDP Logs

Yes

Yes

No

Top Botnet Threats by Destination Address via IDP Logs

Yes

Yes

No

Top Botnet Threats by Threat Severity via IDP Logs

Yes

Yes

No

Top Malware Threats by Source Address via IDP Logs

Yes

Yes

No

Top Malware Threats by Destination Address via IDP Logs

Yes

Yes

No

Top Malware Threats by Threat Severity via IDP Logs

Yes

Yes

No

Top Blocked Applications via Webfilter Logs

Yes

Yes

No

Top Permitted Application Subcategories by Volume via Webfilter Logs

Yes

Yes

No

Top Permitted Application Subcategories by Count via Webfilter Logs

Yes

Yes

No

Generate Reports

Procedure

To generate a report:

  1. Click Reports.
  2. Select the predefined report name and click Generate Report.

    The Report Title window appears.

    Note You can select single or multiple report names or all the predefined report names and generate a consolidated report. But you cannot generate group and individual reports at the same time.

  3. Complete the configuration according to the guidelines provided in Table 296.
  4. Click Save to save the generated report in the desired location.

    A reported is generated. The report includes, the time when it was generated, the table of contents, and the result (a bar graph, a tabular format, and so on). If there is no data available, the report shows, No data to display.

Table 296: Generate Report Settings

Field

Action

Name

Enter a name of the report. Maximum 60 characters.

Customer Name

Enter a customer name. Default value is Juniper.

Description

Enter a description of the report.

Show Top

Use the up and down arrow to select the number of records to display in the report.

Show Details

Select an option from the list:

  • Top Selected—Displays only the top selected details in the report.

  • All—Displays all the details in the report.

    Note: It may take a while to generate reports, depending on the device data size.

Time Span

Select a predefined time span from the list for the report.

From

Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats) to start the report generation.

To

Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats) to stop the report generation.

Sorting Options

Show Details

Click the arrow next to Sorting Options and select one of the options from the list:

  • Largest To Smallest—Display reports from largest to smallest details.

  • Smallest To Largest—Display reports from smallest to largest details.

Threat Assessment Report

Threat Assessment report contains the following content:

Starting in Junos OS Release 19.4R1, the Threat Assessment report displays a new Filename column in the Malware downloaded by User table. This column helps to identify the malware filename.

Application and User Usage

Application and User Usage report contains the following content:

Top Talkers

Top Talkers report contains the following content:

IPS Threat Environment

IPS Threat Environment report contains the following content:

Note IPS Threat Environment report is not supported for tenant users.

Viruses Blocked

Viruses Blocked report contains the following content:

Note Viruses Blocked is not supported for tenant users.

URL Report

URL Report contains the following content:

Virus: Top Blocked

Virus: Top Blocked report contains Virus: Top Blocked content.

Note Virus: Top Blocked is not supported for tenant users.

Top Firewall Events

Top Firewall Events report contains Top Firewall Events.

Top Firewall Deny Destinations

Top Firewall Deny Destinations report contains Top Firewall Deny Destinations.

Top Firewall Service Deny

Top Firewall Service Deny report contains Top Firewall Service Deny.

Top Firewall Denies

Top Firewall Denies report contains Top Firewall Denies.

Top IPS Events

Top IPS Events report contains Top IPS Events.

Note Top IPS Events is not supported for tenant users.

Top Anti-spam Detected

Top Anti-Spam Detected report Top Anti-spam Detected.

Note Top Anti-spam Detected is not supported for tenant users.

Top Screen Attackers

Top Screen Attackers report contains Top Screen Attackers.

Top Screen Victims

Top Screen Victims report contains Top Screen Victims.

Top Screen Hits

Top Screen Hits report contains Top Screen Hits.

Top Firewall Rules

Top Firewall Rules report contains Top Firewall Rules.

Top Firewall Deny Sources

Top Firewall Deny Sources report contains Top Firewall Deny Sources.

Top IPS Attack Sources

Top IPS Attack Sources report contains Top IPS Attack Sources.

Top IPS Attack Destinations

Top IPS Attack Destinations report contains Top IPS Attack Destinations.

Note Top IPS Attack Destinations is not supported for tenant users.

Top IPS Rules

Top IPS Rules report contains Top IPS Rules.

Note Top IPS Rules is not supported for tenant users.

TopWeb Apps

Top Web Apps report contains Top Web Apps.

Note TopWeb Apps is not supported for tenant users.

Top Roles

Top Roles report contains Top Roles.

Note Top Roles is not supported for tenant users.

Top Applications Blocked

Top Applications Blocked report contains Top Applications Blocked.

Note Top Applications Blocked is not supported for tenant users.

Top URLs by User

Top URLs by User report contains Top URLs by User.

Note Top URLs by User is not supported for tenant users.

Top Source Zone by Volume

Top Source Zone by Volume report contains Top Source Zone by Volume.

Top Applications by User

Top Applications by User report contains Top Applications by User.

Top Botnet Threats By Source Address via IDP Logs

Top Botnet Threats By Source Address via IDP Logs report contains Top Botnet Threats By Source Address via IDP Logs.

Note Top Botnet Threats By Source Address via IDP Logs is not supported for tenant users.

Top Botnet Threats by Destination Address via IDP Logs

Top Botnet Threats by Destination Address via IDP Logs report contains Top Botnet Threats by Destination Address via IDP Logs.

Note Top Botnet Threats by Destination Address via IDP Logs is not supported for tenant users.

Top Botnet Threats by Threat Severity via IDP Logs

Top Botnet Threats by Threat Severity via IDP Logs report contains Top Botnet Threats by Threat Severity via IDP Logs.

Note Top Botnet Threats by Threat Severity via IDP Logs is not supported for tenant users.

Top Malware Threats by Source Address via IDP Logs

Top Malware Threats by Source Address via IDP Logs report contains Top Malware Threats by Source Address via IDP Logs.

Note Top Malware Threats by Source Address via IDP Logs is not supported for tenant users.

Top Malware Threats by Destination Address via IDP Logs

Top Malware Threats by Destination Address via IDP Logs report contains Top Malware Threats by Destination Address via IDP Logs.

Note Top Malware Threats by Destination Address via IDP Logs is not supported for tenant users.

Top Malware Threats by Threat Severity via IDP Logs

Top Malware Threats by Threat Severity via IDP Logs report contains Top Malware Threats by Threat Severity via IDP Logs.

Note Top Malware Threats by Threat Severity via IDP Logs is not supported for tenant users.

Top Blocked Applications via Webfilter Logs

Top Blocked Applications via Webfilter Logs report contains Top Blocked Applications via Webfilter Logs.

Note Top Blocked Applications via Webfilter Logs is not supported for tenant users.

Top Permitted Application Subcategories by Volume via Webfilter Logs

Top Permitted Application Subcategories by Volume via Webfilter Logs report contains Top Permitted Application Subcategories by Volume via Webfilter Logs.

Note Top Permitted Application Subcategories by Volume via Webfilter Logs is not supported for tenant users.

Top Permitted Application Subcategories by Count via Webfilter Logs

Top Permitted Application Subcategories by Count via Webfilter Logs report contains Top Permitted Application Subcategories by Count via Webfilter Logs.

Note Top Permitted Application Subcategories by Count via Webfilter Logs is not supported for tenant users.

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit