Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

February 04, 2022 Release

New Features: February 04, 2022

Organization Account

Support for creating organization account—You can onboard yourself to Juniper Security Director Cloud by creating an account and setting up an organization space to manage your network security. [See Security Director Day One + Guide.]

Dashboard

Security dashboard—You can use the widgets in the user-configurable security dashboard to get a customized view of network services. You can drag these widgets from the top of the dashboard to your workspace, where you can add, remove, and rearrange them to meet your needs. You see the following information on the security dashboard:

  • VPN tunnel status
  • Device connection status
  • Devices by OS versions and platforms
  • Device subscription status and management entitlements
  • Overall storage usage
  • Total IPS event count
  • Total virus event count
  • Top firewall events and request denials
  • Top source and destination IP addresses and IP address translations
  • Top IP traffic
  • Top infected hosts and websites blocked
  • Top applications by number of sessions and traffic volume
  • Top spam by source IP addresses

[See About the Dashboard page in the Juniper Security Director Cloud User Guide.]

Monitor

  • Alerts—You can define alert criteria based on a set of predefined filters. You can use the filters on the Event Viewer page to generate alerts. You can generate an alert message to notify you when the alert criteria is met and search for specific alerts based on alert ID, description, alert definition, alert type, or recipient e-mail address. [See Alerts Overview in the Juniper Security Director Cloud User Guide.]

  • Support for logs—You can monitor security-based events using various policy types such as security policies, web filtering, antispam, antivirus, and IPsec VPNs. [See About the Session Page, About the Threats Page, About the Web Filtering Events Page, About the IPsec VPNs Events Page, and About the All Events Page in the Juniper Security Director Cloud User Guide.]

  • View threat events in a visual map—You can visualize incoming and outgoing threats across geographic regions in the visual threat map. You can view blocked and allowed threat events based on feeds from intrusion prevention system (IPS), antivirus, and antispam engines. The threat map also displays details such as event counts of attack objects for specific geographical locations. This event count is useful for viewing unusual activity that could indicate a possible attack. [See Threat Map Overview in the Juniper Security Director Cloud User Guide.]

  • VPN tunnel status—You can view the status of IPsec VPN tunnels in a dashboard and tabular format. The number of tunnels for each VPN depends on the type of VPN, such as site-to-site or hub-and-spoke. [See About the Tunnel Status Page in the Juniper Security Director Cloud User Guide. ]
  • Application visibility—You can view information about bandwidth consumption, session establishment, and the risks associated with your network applications. Analyze your network applications to obtain useful security management information, such as:

    • Applications that can lead to data loss
    • Bandwidth overconsumption
    • Time-consuming applications
    • Personal applications that can increase business risks

    [See About the Application Visibility Page in the Juniper Security Director Cloud User Guide.]

  • User visibility—You can view information about devices. For examples, you can view the top 50 devices that are accessing high bandwidth-consuming applications and are establishing a higher number of sessions on your network. Based on this information, you can choose to rate-limit a device that is accessing applications that consume a large bandwidth or create maximum traffic. [See About the User Visibility Page in the Juniper Security Director Cloud User Guide.]

  • Manage reports—View and manage reports that are generated based on a summary of network activity and overall network status. You can use these reports to perform a trend analysis of your network's activities to study changes in traffic patterns. In addition to using the predefined reports, you can build custom reports that meet specific needs. [See Reports Overview in the Juniper Security Director Cloud User Guide.]

Device Management

  • Add and manage devices—You can add devices and device clusters to Juniper Security Director Cloud using commands and zero-touch provisioning (ZTP) or through J-Web and Juniper Security Director. Device inventory information helps you monitor and manage these resources. You can view the inventory and configuration of devices, reboot devices, roll back configurations, upgrade images, synchronize devices, enable security logging, and export device information. [See About the Devices Page in the Juniper Security Director Cloud User Guide and Security Director Day One + Guide.]

  • Add licenses—You can add a license for a feature to a device or a device cluster. Each license is associated with a software feature such as IPS and content security, and it is valid for only one device. [See Add a License to Device in the Juniper Security Director Cloud User Guide.]

  • Import certificates—You can import device certificates to authenticate Secure Socket Layer (SSL). SSL uses public-private key technology that requires a paired private key and an authentication certificate for providing the SSL service. SSL encrypts communication between your device and the Web browser using a session key that is negotiated by the SSL server certificate. [See Import a Device Certificate in the Juniper Security Director Cloud User Guide.]

  • Manage configuration templates—You can deploy customized configurations on devices. Juniper Security Director Cloud provides configuration templates to provision configurations, both during onboarding and throughout the device life cycle. You can view, create, modify, clone, and delete configuration templates. In addition, you can deploy configuration templates on one or more devices. You can use the preview and deploy workflows to validate a configuration template. [See About the Configuration Templates Page in the Juniper Security Director Cloud User Guide.]

  • Manage software images—You can manage the entire life cycle of the software images of all managed network devices. You can add, stage, deploy, and delete software images of the devices. [See About the Images Page in the Juniper Security Director Cloud User Guide.]

  • Manage security packages—Security packages consist of IPS signatures, application signatures, and URL categories. You can view a list of the latest security packages available on Juniper Security Director Cloud, install the latest security packages on the devices, and view the currently installed security packages on the devices. [See About Security Packages Page in the Juniper Security Director Cloud User Guide.]

Security Policies

Manage security policies—You can create, modify, and delete security policies and associate devices with the security policies. You can also create, modify, and delete the rules that are associated with a security policy. Security policies can incorporate both Transport Layer (Layer 4) and Application Layer (Layer 7) firewall constructs in a single rule. Security rules consist of source and destination endpoints, IP addresses, user identity, URL categories, services, and applications (Layer 7). You can create zone-based rules or global rules. [See About the Security Policy Page in the Juniper Security Director Cloud User Guide.]

NAT

  • Manage NAT policy rules—You can create, edit, clone, and delete NAT policy rules. NAT is a form of network masquerading, where you can hide devices between zones or interfaces. You can use Juniper Security Director Cloud to configure three types of NAT on SRX Series devices: source NAT, destination NAT, and static NAT. [See About the NAT Policies Page in the Juniper Security Director Cloud User Guide.]

  • Manage NAT pools—You can create, edit, clone, and delete NAT pools. A NAT pool is a set of IP addresses that you can define and use for address translation. NAT policies translate internal IP addresses to the addresses in these pools. [See About the NAT Pools Page in the Juniper Security Director Cloud User Guide.]

Shared Objects

  • Manage addresses and address groups—You can create, edit, and delete addresses and address groups. You use addresses and address groups in firewall and NAT services. [See About the Addresses Page in the Juniper Security Director Cloud User Guide.]

  • Manage services and service groups—You can create, edit, and delete services and service groups. A service is an application on a device. After you create a service, you can combine it with other services to form a service group. Service groups are useful when you want to apply the same policy to multiple services. [See About the Services Page in the Juniper Security Director Cloud User Guide.]

  • Manage application signatures and application signature groups—You can view application signatures that are already downloaded. You can also create, modify, clone, and delete custom application signatures or custom application signature groups. Juniper Networks provides signature definitions of known application objects to identify applications for tracking and for firewall policies. [See About the Application Signatures Page in the Juniper Security Director Cloud User Guide.]

  • Manage security policy schedules—You can create, modify, clone, and delete security policy schedules. You use a schedule to run a security policy rule for a specified period either on a one-time basis or on a recurring basis, based on how the schedule is created. [See About Schedules Page in the Juniper Security Director Cloud User Guide.]

  • JIMS—Juniper Identity Management Service (JIMS) provides a robust and scalable user identification and IP address mapping implementation that includes endpoint context and machine ID. You can use Juniper Security Director Cloud to push the JIMS configuration to SRX Series devices. You can then use JIMS to obtain IP addresses or user mapping and device information. SRX Series devices generate the authentication entries for user firewalls. [See About the Identity Management Profile Page in the Juniper Security Director Cloud User Guide.]

  • Configure Active Directory profiles—You can configure the IP address-to-user mapping information and the user-to-group mapping information to access the LDAP server. You can view, create, modify, clone, and delete Active Directory profiles. In addition, you can deploy Active Directory profiles on one or more SRX Series devices. [See About the Active Directory Profiles Page in the Juniper Security Director Cloud User Guide.]

  • Configure access profiles—You can configure LDAP for SRX Series devices that use the integrated user firewall feature. With access profiles, you can enable access configuration on the network. Access configuration consists of authentication configuration. Juniper Security Director Cloud supports RADIUS, LDAP, and local authentication as authentication methods. [See About the Access Profile Page in the Juniper Security Director Cloud User Guide.]

  • Configure address pools—You can create centralized IPv4 address pools independent of the client applications that use the pools. An address pool is a set of IP addresses available for allocation to users, such as in-host configurations with DHCP. You can have only IPv4 addresses in an address-assignment pool. [See About the Address Pools Page in the Juniper Security Director Cloud User Guide.]

Security Subscriptions

  • Manage IPS profiles—You can create, modify, clone, and delete IPS profiles. Juniper Security Director Cloud contains predefined IPS profiles. You can also create customized IPS profiles. You can associate IPS rules and exempt rules with IPS profiles. You can deploy the IPS profiles in a device by referencing the IPS profiles in a security policy rule that is deployed on the device. [See About the IPS Profiles Page in the Juniper Security Director Cloud User Guide.]

  • Manage IPS signatures—You can create, modify, clone, and delete IPS signatures, signature groups, and dynamic groups. IPS compares traffic against the signatures of known threats and blocks traffic when a threat is detected. You can use IPS signatures to monitor and prevent intrusions. Juniper Security Directory Cloud contains predefined IPS signatures. You can also create customized IPS signatures. [See About the IPS Signatures Page in the Juniper Security Director Cloud User Guide.]

  • Manage decrypt profiles—You can create, modify, clone, and delete decrypt profiles. SSL proxy is enabled as an application service within a security policy. SSL proxy performs SSL encryption and decryption between the client and the server, but neither the server nor the client can detect the presence of SSL proxy. SSL proxy ensures that it has the keys to encrypt and decrypt the payload. [See About the Decrypt Profiles Page in the Juniper Security Director Cloud User Guide.]

  • Manage content security profiles—You can view and manage content security profiles. Content security profiles consolidate several security features such as antivirus, antispam, content filtering, and Web filtering to protect against multiple threat types. [See About the UTM Profiles Page in the Juniper Security Director Cloud User Guide.]

  • Manage IPsec VPNs—You can view and manage IPsec VPN profiles. You use IPsec VPN profiles to securely communicate with remote computers across a public WAN, such as the Internet. A VPN connection can link two LANs (site-to-site VPN) or a remote dial-up user and a LAN. The traffic that flows between these two points passes through shared resources such as routers, switches, and other network equipment that make up the public WAN. Juniper Security Director Cloud simplifies the management and deployment of IPsec VPNs. [See IPsec VPN Overview in the Juniper Security Director Cloud User Guide.]

Administration

  • Manage subscriptions—You can add, manage, and apply your purchased subscriptions in Juniper Security Director Cloud. [See About the Juniper Security Director Cloud Subscriptions Page in the Juniper Security Director Cloud User Guide.]
  • Manage users and roles—You can add, clone, modify, and delete roles and users. Juniper Security Director Cloud supports authentication and role-based access control (RBAC) for its resources and services. You can use access controls to assign different access privileges to different users. [See Users Overview and Roles Overview in the Juniper Security Director Cloud User Guide.]

  • View and export audit logs—You can view and export the audit logs. Audit logs contain information about the tasks that you initiate by using the Juniper Security Director Cloud GUI or APIs. Audit log entries usually include details about user-initiated tasks such as the name, role, and IP address of the user who initiated the task, the status of the tasks, and the date and time of execution. You can export audit logs in CSV or PDF formats. [See About the Audit Logs Page in the Juniper Security Director Cloud User Guide.]
  • Manage process jobs—You can view and manage jobs, which are actions performed on objects that Juniper Security Director Cloud manages, such as a device, service, or user. You can choose to run a job immediately or schedule one for later. You can also monitor the status of jobs. [See Job Management in Juniper Security Director Cloud in the Juniper Security Director Cloud User Guide.]

  • Manage device data—You can view, export, and delete device logs related to security and data traffic. You can export logs for the past one week or one month in the CSV format. [See About the Data Management Page in the Juniper Security Director Cloud User Guide.]

  • Create multiple organizations—You can create multiple organization accounts in Juniper Security Director Cloud that support segregation of large groups of users into smaller, more manageable groups and control administrative access. Using these organization accounts, you can add devices, subscribe your devices, and start managing the devices. You can also modify or delete existing organizations." [See About the Organization Page in the Juniper Security Director Cloud User Guide.]