Help Center User GuideGetting Started
 
X
User Guide
Getting Started
Contents  

Monitor Applications

You are here: Monitor > Security Services > Applications.

Use this page to view information about bandwidth consumption, session establishment, and risks associated with your applications.

Note To view the data on the Applications page, ensure that:

  • On-box traffic logging and reporting is enabled. If not, go to Device Administration > Basic Settings > Security Logging, enable Stream mode Logging and On-box Reporting.

  • Logging is enabled for a matching traffic firewall policy. If not, go to Security Policies & Objects > Security Policies and enable Logging options under Rule Options.

  • Application tracking is enabled for a security zone. If not, go to Security Policies & Objects > Zones/Screens and enable Application Tracking in the Add Zone page.

Table 92 describes the fields on the Applications page.

Table 92: Fields on the Applications Page

Field

Description

Top Users By Volume

Top users of the application; sorted by bandwidth consumption.

Top Apps By Volume

Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by bandwidth consumption.

Top Category By Volume

Top category, such as web, infrastructure, and so on of the application; sorted by bandwidth consumption.

Top Characteristics By Volume

Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and so on of the application.

Sessions By Risk

Number of events/sessions received; grouped by risk.

View App Logs

Enables you to view the application logs.

Search

Enables you to search a particular content from the data.

Application Name

Name of the application, such as Amazon, Facebook, and so on.

Risk Level

Risk associated with the application: critical, high, unsafe, moderate, low, and unknown.

Users

Total number of users accessing the application.

Volume

Bandwidth used by the application.

Total Sessions

Total number of application sessions.

Category

Category of the application, such as web, infrastructure, and so on.

Sub-Category

Subcategory of the application. For example, social networking, news, and advertisements.

Note: There can be many sub-categories for a single category. For example, if the Category is Multimedia, it can have sub-categories as Video-streaming and Audio-streaming and so on.

Characteristics

Characteristics of the application. For example, prone to misuse, bandwidth consumer, capable of tunneling.

Note: There can be many characteristics displayed by a comma separator. For example, characteristics can be displayed as Support File Transfer, Loss of Productivity, Bandwidth.

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit