Chart Types
When you create a report, you must choose a chart type for each chart you include in your report.
The chart type determines how the data and network objects appear in your report.
You can use any of the following types of charts:
Chart Type |
Description |
---|---|
None |
Use this option if you need white space in your report. If you select the None option for any container, no further configuration is required for that container. |
Asset Vulnerabilities |
Use this chart to view vulnerability data for each defined asset in your deployment. You can generate Asset Vulnerability charts when vulnerabilities have been detected by a VA scan. This chart is available after you install JSA Vulnerability Manager. |
Connections |
This chart option is only displayed if you purchased and licensed JSA Risk Manager. For more information, see the Juniper Secure Analytics Risk Manager User Guide. |
Device Rules |
This chart option is only displayed if you purchased and licensed JSA Risk Manager. For more information, see the Juniper Secure Analytics Risk Manager User Guide. |
Device Unused Objects |
This chart option is only displayed if you purchased and licensed JSA Risk Manager. For more information, see the Juniper Secure Analytics Risk Manager User Guide. |
Events/Logs |
Use this chart to view event information. You can base a chart on data from saved searches on the Log Activity tab. You can configure the chart to plot data over a configurable period of time to detect event trends. For more information about saved searches, see Searches |
Log Sources |
Use this chart to export or report on log sources. Select the log sources and log source groups that you want to appear in the report. Sort log sources by report columns. Include log sources that are not reported for a defined time period. Include log sources that were created in a specified time period. |
Flows |
Use this chart to view flow information. You can base a chart on data from saved searches on the Network Activity tab. You can configure the chart to plot flow data over a configurable period of time to detect flow trends. For more information about saved searches, see Searches |
Top Destination IPs |
Use this chart to display the top destination IPs in the network locations you select. |
Top Offenses |
Use this chart to display the top offenses that occur at present time for the network locations you select. |
Offenses Over Time |
Use this chart to display all offenses that have a start time within a defined time span for the network locations you select. |
Top Source IPs |
Use this chart to display and sort the top offense sources (IP addresses) that attack your network or business assets. |
Vulnerabilities |
The Vulnerabilities option is only displayed when the JSA Vulnerability Manager was purchased and licensed. For more information, see the Juniper Secure Analytics Vulnerability Manager User Guide. |
Chart Type |
Description |
---|---|
None |
Use this option if you need white space in your report. If you select the None option for any container, no further configuration is required for that container. |
Asset Vulnerabilities |
Use this chart to view vulnerability data for each defined asset in your deployment. You can generate Asset Vulnerability charts when vulnerabilities have been detected by a VA scan. This chart is available after you install JSA Vulnerability Manager. |
Vulnerabilities |
The Vulnerabilities option is only displayed when the JSA Vulnerability Manager was purchased and licensed. For more information, see the Juniper Secure Analytics Vulnerability Manager User Guide. |