Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Identifying Security Monitoring Devices and Flow Data Sources

 

Juniper Secure Analytics (JSA) can collect and correlate events received from external sources such as security equipment (for example, firewalls, VPNs, or IDSs) and host or application security logs, such as Windows logs. Device Support Modules (DSMs) and Flow Collectors allow you to integrate JSA with this external data. JSA automatically discovers sensor devices that are sending system log (syslog) messages to an Event Collector. The sensor devices that are automatically discovered by JSA appear in the Sensor Devices window within the JSA Administration Console. Once autodiscovery is completed, you should disable the Auto Detection Enabled option in the Event Collector configuration. For more information, see the Administration Guide and Log Sources Users Guide.