Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Step 3: Keep Going

What’s Next?

If You Want To

Then

Create or import a security policy, add a rule to the security policy, and deploy the security policy on the devices

See Security Policies Overview

Create a NAT policy, add a rule to the NAT policy, and deploy the NAT policy on the devices

See NAT Policies Overview

Set up the Content Security profiles to secure your network from multiple security threat types

See Content Security Overview

View the traffic logs and network events including viruses found, interfaces that are down, number of attacks, and sessions

See About the Session Page and About the All Security Events Page

Monitor the status of the CPU, disk space, storage database, and services running on the Juniper Security Director VM

System Overview

Configure log level settings, generate and download system logs to troubleshoot the issues related to Juniper Security Director

See About System Logs Page

General Information

If You Want To

Then

See all the available documentation for Juniper Security Director

Visit Juniper Security Director