Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

About Reports Page

 

Overview

Use the Reports menu to generate reports on demand. There are several predefined reports listed in this page, see Table 1. The generated report is displayed in HTML format. You can group multiple reports and generate a consolidated report.

Logical system and tenant support the reports listed in Table 1 only for SRX1500, SRX4100, SRX4200, and SRX4600.

Table 1: Predefined Group Reports and Supported Users

Report Name

Root

Logical System Users

Tenant Users Support

Threat Assessment Report

Yes

Yes

Yes

Application and User Usage

Yes

Yes

Yes

Top Talkers

Yes

Yes

Yes

IPS Threat Environment

Yes

Yes

No

URL Report

Yes

Yes

Yes

Viruses Blocked

Yes

Yes

No

Virus: Top Blocked

Yes

Yes

No

Top Firewall Events

Yes

Yes

Yes

Top Firewall Deny Destinations

Yes

Yes

Yes

Top Firewall Service Deny

Yes

Yes

Yes

Top Firewall Denies

Yes

Yes

Yes

Top IPS Events

Yes

Yes

No

Top Anti-spam Detected

Yes

Yes

No

Top Screen Attackers

Yes

Yes

Yes

Top Screen Victims

Yes

Yes

Yes

Top Screen Hits

Yes

Yes

Yes

Top Firewall Rules

Yes

Yes

Yes

Top Firewall Deny Sources

Yes

Yes

Yes

Top IPS Attack Sources

Yes

Yes

Yes

Top IPS Attack Destinations

Yes

Yes

No

Top IPS Rules

Yes

Yes

No

Top Web Apps

Yes

Yes

No

Top Roles

Yes

Yes

No

Top Applications Blocked

Yes

Yes

No

Top URLs by User

Yes

Yes

No

Top Source Zone by Volume

Yes

Yes

Yes

Top Applications by User

Yes

Yes

Yes

Top Botnet Threats By Source Address via IDP Logs

Yes

Yes

No

Top Botnet Threats by Destination Address via IDP Logs

Yes

Yes

No

Top Botnet Threats by Threat Severity via IDP Logs

Yes

Yes

No

Top Malware Threats by Source Address via IDP Logs

Yes

Yes

No

Top Malware Threats by Destination Address via IDP Logs

Yes

Yes

No

Top Malware Threats by Threat Severity via IDP Logs

Yes

Yes

No

Top Blocked Applications via Webfilter Logs

Yes

Yes

No

Top Permitted Application Subcategories by Volume via Webfilter Logs

Yes

Yes

No

Top Permitted Application Subcategories by Count via Webfilter Logs

Yes

Yes

No

Generate Reports

To generate a report:

  1. Click Reports.
  2. Select the predefined report name and click Generate Report.

    The Report Title window appears.

    Note

    You can select single or multiple report names or all the predefined report names and generate a consolidated report. But you cannot generate group and individual reports at the same time.

  3. Complete the configuration according to the guidelines provided in Table 2.
  4. Click Save to save the generated report in the desired location.

    A reported is generated. The report includes, the time when it was generated, the table of contents, and the result (a bar graph, a tabular format, and so on). If there is no data available, the report shows, No data to display.

Table 2: Generate Report Settings

Field

Action

Name

Enter a name of the report. Maximum 60 characters.

Customer Name

Enter a customer name. Default value is Juniper.

Description

Enter a description of the report.

Show Top

Use the up and down arrow to select the number of records to display in the report.

Show Details

Select an option from the list:

  • Top Selected—Displays only the top selected details in the report.

  • All—Displays all the details in the report.

    Note: It may take a while to generate reports, depending on the device data size.

Time Span

Select a predefined time span from the list for the report.

From

Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats) to start the report generation.

To

Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats) to stop the report generation.

Sorting Options

Show Details

Click the arrow next to Sorting Options and select one of the options from the list:

  • Largest To Smallest—Display reports from largest to smallest details.

  • Smallest To Largest—Display reports from smallest to largest details.

Threat Assessment Report

Threat Assessment report contains the following content:

  • Executive Summary

  • Application Risk Assessment

  • Threat & Malware Assessment

  • User and Web Access Assessment

Starting in Junos OS Release 19.4R1, the Threat Assessment report displays a new Filename column in the Malware downloaded by User table. This column helps to identify the malware filename.

Application and User Usage

Application and User Usage report contains the following content:

  • Top High Risk Applications by Bandwidth

  • Top High Risk Applications By Count

  • Top Categories By Bandwidth

  • Top Applications By Bandwidth

  • Top Categories By Count

  • Top Applications By Count

  • Top Users Of High Risk Applications By Bandwidth

  • Top Users By Bandwidth

  • High Risk Applications Allowed Per User

  • High Risk Applications Blocked Per User

Top Talkers

Top Talkers report contains the following content:

  • Top Source IPs by Bandwidth

  • Top Destination IPs by Bandwidth

  • Top Source IPs by Session

  • Top Destination IPs by Session

  • Top Users By Bandwidth

  • Top Users By Count

IPS Threat Environment

IPS Threat Environment report contains the following content:

  • IPS Attacks by Severity Over Time

  • Total IPS Attacks by Severity

  • Top IPS Categories Blocked

  • Top IPS Attacks Blocked

  • Top Targeted Hosts by IP

  • Top Targeted Hosts by User

Note

IPS Threat Environment report is not supported for tenant users.

Viruses Blocked

Viruses Blocked report contains the following content:

  • Total Viruses Blocked Over Time

  • Top Viruses Blocked

Note

Viruses Blocked is not supported for tenant users.

URL Report

URL Report contains the following content:

  • Top URLs by Bandwidth

  • Top URLs by Count

  • Top URL Categories by Bandwidth

  • Top URL Categories by Count

  • Total URLs Blocked Over Time

  • Top Blocked URLs

  • Top Blocked URL Categories by Count

  • Users With Most Blocked URLs

Virus: Top Blocked

Virus: Top Blocked report contains Virus: Top Blocked content.

Note

Virus: Top Blocked is not supported for tenant users.

Top Firewall Events

Top Firewall Events report contains Top Firewall Events.

Top Firewall Deny Destinations

Top Firewall Deny Destinations report contains Top Firewall Deny Destinations.

Top Firewall Service Deny

Top Firewall Service Deny report contains Top Firewall Service Deny.

Top Firewall Denies

Top Firewall Denies report contains Top Firewall Denies.

Top IPS Events

Top IPS Events report contains Top IPS Events.

Note

Top IPS Events is not supported for tenant users.

Top Anti-spam Detected

Top Anti-Spam Detected report Top Anti-spam Detected.

Note

Top Anti-spam Detected is not supported for tenant users.

Top Screen Attackers

Top Screen Attackers report contains Top Screen Attackers.

Top Screen Victims

Top Screen Victims report contains Top Screen Victims.

Top Screen Hits

Top Screen Hits report contains Top Screen Hits.

Top Firewall Rules

Top Firewall Rules report contains Top Firewall Rules.

Top Firewall Deny Sources

Top Firewall Deny Sources report contains Top Firewall Deny Sources.

Top IPS Attack Sources

Top IPS Attack Sources report contains Top IPS Attack Sources.

Top IPS Attack Destinations

Top IPS Attack Destinations report contains Top IPS Attack Destinations.

Note

Top IPS Attack Destinations is not supported for tenant users.

Top IPS Rules

Top IPS Rules report contains Top IPS Rules.

Note

Top IPS Rules is not supported for tenant users.

TopWeb Apps

Top Web Apps report contains Top Web Apps.

Note

TopWeb Apps is not supported for tenant users.

Top Roles

Top Roles report contains Top Roles.

Note

Top Roles is not supported for tenant users.

Top Applications Blocked

Top Applications Blocked report contains Top Applications Blocked.

Note

Top Applications Blocked is not supported for tenant users.

Top URLs by User

Top URLs by User report contains Top URLs by User.

Note

Top URLs by User is not supported for tenant users.

Top Source Zone by Volume

Top Source Zone by Volume report contains Top Source Zone by Volume.

Top Applications by User

Top Applications by User report contains Top Applications by User.

Top Botnet Threats By Source Address via IDP Logs

Top Botnet Threats By Source Address via IDP Logs report contains Top Botnet Threats By Source Address via IDP Logs.

Note

Top Botnet Threats By Source Address via IDP Logs is not supported for tenant users.

Top Botnet Threats by Destination Address via IDP Logs

Top Botnet Threats by Destination Address via IDP Logs report contains Top Botnet Threats by Destination Address via IDP Logs.

Note

Top Botnet Threats by Destination Address via IDP Logs is not supported for tenant users.

Top Botnet Threats by Threat Severity via IDP Logs

Top Botnet Threats by Threat Severity via IDP Logs report contains Top Botnet Threats by Threat Severity via IDP Logs.

Note

Top Botnet Threats by Threat Severity via IDP Logs is not supported for tenant users.

Top Malware Threats by Source Address via IDP Logs

Top Malware Threats by Source Address via IDP Logs report contains Top Malware Threats by Source Address via IDP Logs.

Note

Top Malware Threats by Source Address via IDP Logs is not supported for tenant users.

Top Malware Threats by Destination Address via IDP Logs

Top Malware Threats by Destination Address via IDP Logs report contains Top Malware Threats by Destination Address via IDP Logs.

Note

Top Malware Threats by Destination Address via IDP Logs is not supported for tenant users.

Top Malware Threats by Threat Severity via IDP Logs

Top Malware Threats by Threat Severity via IDP Logs report contains Top Malware Threats by Threat Severity via IDP Logs.

Note

Top Malware Threats by Threat Severity via IDP Logs is not supported for tenant users.

Top Blocked Applications via Webfilter Logs

Top Blocked Applications via Webfilter Logs report contains Top Blocked Applications via Webfilter Logs.

Note

Top Blocked Applications via Webfilter Logs is not supported for tenant users.

Top Permitted Application Subcategories by Volume via Webfilter Logs

Top Permitted Application Subcategories by Volume via Webfilter Logs report contains Top Permitted Application Subcategories by Volume via Webfilter Logs.

Note

Top Permitted Application Subcategories by Volume via Webfilter Logs is not supported for tenant users.

Top Permitted Application Subcategories by Count via Webfilter Logs

Top Permitted Application Subcategories by Count via Webfilter Logs report contains Top Permitted Application Subcategories by Count via Webfilter Logs.

Note

Top Permitted Application Subcategories by Count via Webfilter Logs is not supported for tenant users.

Release History Table
Release
Description
Starting in Junos OS Release 19.4R1, the Threat Assessment report displays a new Filename column in the Malware downloaded by User table. This column helps to identify the malware filename.