Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Capabilities in Your JSA Product

JSA product documentation describes functionality such as offenses, flows, assets, and historical correlation, that might not be available in all JSA products. Depending on the product that you are using, some documented features might not be available in your deployment.

  • Log Manager--Log Manager is a basic, high-performance, and scalable solution for collecting, analyzing, storing, and reporting on large volumes of network and security event logs.

  • JSA--JSA is an advanced offering that includes the full range of security intelligence capabilities for on-premises deployments. It consolidates log source and network flow data from thousands of assets, devices, endpoints, and applications that are distributed throughout your network, and performs immediate normalization and correlation activities on the raw data to distinguish real threats from false positives.

JSA Product Capabilities

JSA product documentation describes capabilities, such as offenses, flows, assets, and historical correlation, that might not be available in all JSA products. Review the following table to compare the capabilities in each product.

Table 1: Comparison Of JSA Capabilities

Capability

JSA

Log Manager

Full administrative capabilities

Yes

Yes

Supports hosted deployments

No

No

Customizable dashboards

Yes

Yes

Custom rules engine

Yes

Yes

Manage network and security events

Yes

Yes

Manage host and application logs

Yes

Yes

Threshold-based alerts

Yes

Yes

Compliance templates

Yes

Yes

Data archiving

Yes

Yes

Juniper X-Force Threat Intelligence IP reputation feed integration

Yes

Yes

WinCollect stand-alone deployments

Yes

Yes

WinCollect managed deployments

Yes

Yes

JSA Vulnerability Manager integration

Yes

Yes

Network activity monitoring

Yes

No

Asset profiling

Yes

No 1

Offenses management

Yes

No

Network flow capture and analysis

Yes

No

Historical correlation

Yes

No

JSA Vulnerability Manager integration

Yes

Yes

JSA Risk Manager integration

Yes

No

Vulnerability Assessment Scanners

Yes

Yes

1Log Manager tracks asset data only if JSA Vulnerability Manager is installed.

Some documentation, such as the Juniper Secure Analytics Administration Guide and the Juniper Secure Analytics Users Guide, is common across multiple products and might describe capabilities that are not available in your deployment.