Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Preface

This preface contains the following sections:

About This Guide

This guide describes the commands that make up the command-line interface (CLI) of the Juniper ATP Appliance.

This guide is intended for system administrators responsible for deploying, operating, and maintaining the Juniper ATP Appliance.

Organization

This guide is organized as follows:

  • Introduction—Includes an overview of CLI usage, CLI Modes and information about how to access the Juniper ATP Appliance Command Line Interface.

  • All-in-One CLI Commands—Provides information about system commands for updating the product boot images, setting configurations, and defining system-level settings for Collector and Detection Engine interfaces and network deployment services.

  • Core/CM Server CLI Commands—Provides information about commands available to the Core and Central Manager for all hardware appliance, software appliance, and virtual appliance models, including the commands used to manage Detection Engines and Juniper ATP Appliance system configuration.

  • Mac OS X Engine CLI Commands—Provides information about Mac Mini Mac OS X Detection Engine-specific commands for configuration and status monitoring.

  • Traffic Collector CLI Commands—Provides information about the Juniper ATP Appliance Traffic Collector commands available for identifying, monitoring, and configuring distributed Collector hardware, software and virtual appliances.

  • Glossary of Terms—Provides a set Juniper ATP Appliance-specific as well as cybersecurity industry terms and definitions.

Typographical Conventions

This guide uses the following typographical conventions for special terms and instructions.

Table 1: Table 4-1 Typographical Conventions

Convention

Meaning

Example

courier font

Click

Coding examples and text to be entered at the command prompt

A left-mouse button click.

Enter the following command:

server set dns

Click Download IVP to perform endpoint infection verification.

Double-click

A double-click of the left mouse button.

Double-click the report name to open in the integrated SIEM application.

Right-click

A right mouse button click.

Right-click on the icon to view its properties.

< | > (text in angle brackets; items separated by the pipe symbols)

Option for selection of required parameter and/or value.

interfaces set stp <on | off >

[ ] (text in square brackets)

or

[ | ] (text in square brackets, items separated by pipe symbols)

Optional parameters and values, with selection options separated by the pipe symbol.

show device alarm [cpu_util | paging]