Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Apps that are Installed by Default with JSA

To improve workflow, some apps that were previously only available on the IBM Security App Exchange are now installed by default.

Apps installed in JSA 7.4.0

In JSA 7.4.0, the QRadar Assistant app, the JSA Pulse app, and the JSA Log Source Management app are installed by default.

Use the QRadar Assistant app to manage your app and content extension inventory, view app and content extension recommendations, and get links to other information. For more information, see QRadar Assistant App Guide.

JSA Pulse is a dashboard app that you can use to communicate insights and analysis about your network. Take the pulse of your SOC with dynamic real-time dashboards that provide meaningful insights into your security posture and threat landscape. Visualize offenses, network data, threats, and malicious user behavior from around the world in geographical maps, a built-in 3D threat globe, and auto updating charts. Import and export dashboards to share with colleagues. See offenses unfold near real time and track your security threats from around the globe. For more information, see Juniper Secure Anlaytics Pulse App Guide.

The Log Source Management app provides an easy-to-use workflow that helps you quickly find, create, edit, and delete log sources. Use the simplified workflow to change parameters for a number of log sources at the same time. To configure log sources in 7.4.0, you must use the Log Source Management app. For more information, see Juniper Secure Anlaytics Log Source Management App Guide.

Admin users automatically have permissions to use the apps. You must modify non-Admin user roles to add permissions so that other users can use the apps.

Apps installed in JSA 7.4.1

In JSA 7.4.1, the Use Case Manager app is installed by default. Use the guided tips in Use Case Manager to help you ensure that JSA is optimally configured to accurately detect threats throughout the attack chain. Use Case Manager includes a rule explorer that offers flexible reports that are related to your rules. Use Case Manager also exposes pre-defined mappings to system rules and to help you map your own custom rules to MITRE ATT&CK tactics and techniques. For more information, see Juniper Secure Anlaytics Use Case Manager App Guide.