Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Chart Types

When you create a report, you must choose a chart type for each chart you include in your report.

The chart type determines how the data and network objects appear in your report.

You can use any of the following types of charts:

Table 1: Chart Types

Chart Type

Description

None

Use this option if you need white space in your report. If you select the None option for any container, no further configuration is required for that container.

Asset Vulnerabilities

Use this chart to view vulnerability data for each defined asset in your deployment. You can generate Asset Vulnerability charts when vulnerabilities have been detected by a VA scan. This chart is available after you install JSA Vulnerability Manager.

Connections

This chart option is only displayed if you purchased and licensed JSA Risk Manager. For more information, see the Juniper Secure Analytics Risk Manager User Guide.

Device Rules

This chart option is only displayed if you purchased and licensed JSA Risk Manager. For more information, see the Juniper Secure Analytics Risk Manager User Guide.

Device Unused Objects

This chart option is only displayed if you purchased and licensed JSA Risk Manager. For more information, see the Juniper Secure Analytics Risk Manager User Guide.

Events/Logs

Use this chart to view event information. You can base a chart on data from saved searches on the Log Activity tab. You can configure the chart to plot data over a configurable period of time to detect event trends. For more information about saved searches, see Searches

Log Sources

Use this chart to export or report on log sources. Select the log sources and log source groups that you want to appear in the report. Sort log sources by report columns. Include log sources that are not reported for a defined time period. Include log sources that were created in a specified time period.

Flows

Use this chart to view flow information. You can base a chart on data from saved searches on the Network Activity tab. You can configure the chart to plot flow data over a configurable period of time to detect flow trends. For more information about saved searches, see Searches

Top Destination IPs

Use this chart to display the top destination IPs in the network locations you select.

Top Offenses

Use this chart to display the top offenses that occur at present time for the network locations you select.

Offenses Over Time

Use this chart to display all offenses that have a start time within a defined time span for the network locations you select.

Top Source IPs

Use this chart to display and sort the top offense sources (IP addresses) that attack your network or business assets.

Vulnerabilities

The Vulnerabilities option is only displayed when the JSA Vulnerability Manager was purchased and licensed. For more information, see the Juniper Secure Analytics Vulnerability Manager User Guide.

Table 2: Chart Types

Chart Type

Description

None

Use this option if you need white space in your report. If you select the None option for any container, no further configuration is required for that container.

Asset Vulnerabilities

Use this chart to view vulnerability data for each defined asset in your deployment. You can generate Asset Vulnerability charts when vulnerabilities have been detected by a VA scan. This chart is available after you install JSA Vulnerability Manager.

Vulnerabilities

The Vulnerabilities option is only displayed when the JSA Vulnerability Manager was purchased and licensed. For more information, see the Juniper Secure Analytics Vulnerability Manager User Guide.