The Juniper Advanced Threat Prevention Cloud Web UI is a Web-based service portal that lets you monitor malware downloaded through your SRX Series devices.
The Web UI for Juniper ATP Cloud includes a dashboard that provides a summary of all gathered information on compromised content and hosts. Drag and drop widgets to add them to your dashboard. Mouse over a widget to refresh, remove, or edit the contents.
The data on the Web UI dashboard is updated on hourly checks; it does not get updated in real-time.
In addition, you can use the dashboard to:
Navigate to the File Scanning page from the Top Scanned Files and Top Infected Files widgets by clicking the More Details link.
Navigate to the Hosts page from the Top Compromised Hosts widget by clicking the More Details link.
Navigate to the Command and Control Servers page from the C&C Server Malware Source Location widget.
C&C and GeoIP filtering feeds are only available with the Basic-Threat Feed or Premium license. For information on other licensed features, see Juniper Advanced Threat Prevention Cloud License Types.
Available dashboard widgets are as follows:
Table 1: Juniper ATP Cloud Dashboard Widgets
Top Malware Identified
A list of the top malware found based on the number of times the malware is detected over a period of time. Use the arrow to filter by different time frames.
Top Compromised Hosts
A list of the top compromised hosts based on their associated threat level and blocked status.
Top Infected File Types
A graph of the top infected file types by file extension. Examples: exe, pdf, ini, zip. Use the arrows to filter by threat level and time frame.
Top Infected File Categories
A graph of the top infected file categories. Examples: executables, archived files, libraries. Use the arrows to filter by threat level and time frame.
Top Scanned File Types
A graph of the top file types scanned for malware. Examples: exe, pdf, ini, zip. Use the arrows to filter by different time frames.
Top Scanned File Categories
A graph of the top file categories scanned for malware. Examples: executables, archived files, libraries. Use the arrows to filter by different time frames.
C&C Server and Malware Source
A color-coded map displaying the location of Command and Control servers or other malware sources. Click a location on the map to view the number of detected sources.