Help Center User GuideGetting Started
User Guide
Getting Started

Monitor Screen Events

You are here: Monitor > Events > Screen.

Use screen events to view the information about security events based on screen profiles. Analyzing screen logs yields information such as attack name, action taken, source of an attack, and destination of an attack.

You can select either the Grid View tab or the Chart View tab to view your data:

Table 34: Screen—Fields on the Grid View Page



The filter list that is displayed above the grids.

Options available in the filter list are:

  • Event Name—Displays the event name of the log.

  • Source Address—Displays the source addresses to be used as match criteria for the policy. Address sets are resolved to their individual names.

  • Destination Address—Displays the destination addresses (or address sets) to be used as match criteria for the policy. Addresses are entered as specified in the destination zone’s address book.

  • Attack Name—Displays the attack name of the log.

Select the criteria or parameter on which you want to construct the filter statement.


Executes the filter statement that is displayed in the text box.

Click Go.


Clears the filters.

Click X.

Show Hide Column Filter icon represented by three vertical dots

Enables you to show or hide a column in the grid.


Displays the time when the log was received.

Event Name

Displays the event name of the log.

Source Country

Displays the source country of the log.

Source Address

Displays the source address from where the event occurred.

Destination Country

Displays the destination country of the log.

Destination Address

Displays the destination address of the event.

Destination Port

Displays the destination port of the event.

Source Port

Displays the source port of the event.


Displays brief description of the event.

Source Zone Name

Displays the name of the source security zone of the traffic that triggered the event.

Host Name

Displays the host name of the device where the log was generated.


Displays the action taken for the event. For example, warning, allow, and block.

Interface Name

Displays the name of the interface.


Displays the network or subnetwork to which the device belongs.

Table 35: Screen—Widgets on the Chart View Page



Top Screen Attackers

Displays the top source countries from where the event source originated; sorted by the number of source IP addresses.

Top Screen Victims

Displays the top destination countries targeted for the attack; sorted by the number of destination IP addresses.

Top Screen Hits

Displays the top source IP addresses of the network traffic; sorted by the number of event occurrences.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      

Additional Comments

800 characters remaining

May we contact you if necessary?


Need product assistance? Contact Juniper Support