ON THIS PAGE
Step 3: Keep Going
What’s Next?
If You Want To |
Then |
---|---|
Create or import a security policy, add a rule to the security policy, and deploy the security policy on the devices |
|
Create a NAT policy, add a rule to the NAT policy, and deploy the NAT policy on the devices |
|
Set up the Content Security profiles to secure your network from multiple security threat types |
|
View the traffic logs and network events including viruses found, interfaces that are down, number of attacks, and sessions |
See About the Session Page and About the All Security Events Page |
Monitor the status of the CPU, disk space, storage database, and services running on the Juniper Security Director VM |
System Overview |
Configure log level settings, generate and download system logs to troubleshoot the issues related to Juniper Security Director |
General Information
If You Want To |
Then |
---|---|
See all the available documentation for Juniper Security Director |