Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Juniper Security Director Cloud GUI Overview

Juniper Security Director Cloud offers an intuitive, security-oriented GUI to help administrators with various tasks. The main menu options and actions available upon login depend on your access privileges.

We have redesigned the menu to make navigation simpler, more organized, and mobile-friendly. Table 1 shows the mapping between the old and new menu navigation. Menus have been consolidated for easier access, improved categorization of items, and enhanced accessibility.

Table 1: Old vs. New Menu Mapping
Old Menu New Menu
Dashboard Monitor
Monitor > Maps & Charts > CASB Applications Intelligence > CASB Application Visibility
Monitor > Maps & Charts > Insights Intelligence > Insights
Monitor > Maps & Charts > Threat Map Intelligence > Threat Map
SRX > Security Policy > SRX Policy Security > Security Policies
Shared Services > Objects > Addresses Security > Shared Objects > Addresses
Shared Services > Objects > Applications Security > Shared Objects > Applications
Shared Services > Objects > Geo IP Security > Shared Objects > GEO Fencing
Shared Services > Firewall Profiles > Redirect Profiles Security > Shared Objects > Redirect Profiles
Shared Services > Firewall Profiles > Rule Options Security > Shared Objects > Rule Options
Shared Services > Objects > SSL Initiation Profile Security > Shared Objects > SSL Initiation Profile
Shared Services > Objects > Schedules Security > Shared Objects > Schedules
Shared Services > Objects > Services Security > Shared Objects > Services
Shared Services > Objects > URL Categories Security > Shared Objects > URL Categories
Shared Services > Objects > URL Patterns Security > Shared Objects > URL Patterns
Monitor > Tunnel Status > Device Tunnel Status Security > IPsec VPN Management > Device Tunnel Status
SRX > IPsec VPN > Extranet Devices Security > IPsec VPN Management > Extranet Devices
SRX > IPsec VPN > IPsec VPNs Security > IPsec VPN Management > IPsec VPNs
Monitor > Tunnel Status > Site Tunnel Status Security > IPsec VPN Management > Site Tunnel Status
SRX > IPsec VPN > VPN Profiles Security > IPsec VPN Management > VPN Profiles
SRX > Security Subscriptions > Anti-Malware Security > Security Services > Anti-malware
SRX > Security Subscriptions > Content Security > Anti-spam Profiles Security > Security Services > Anti-spam Profiles
SRX > Security Subscriptions > Content Security > Anti-virus Profiles Security > Security Services > Anti-virus Profiles
SRX > Security Subscriptions > Content Security > Content Filtering Policy (NEW) Security > Security Services > Content Filtering Policy (NEW)
SRX > Security Subscriptions > Content Security > Content Filtering Profiles Security > Security Services > Content Filtering Profiles
SRX > Security Subscriptions > Content Security > Content Security Profiles Security > Security Services > Content Security Profiles
SRX > Security Subscriptions > Content Security > Content Security Settings Security > Security Services > Content Security Settings
SRX > Security Subscriptions > Security Metadata Streaming > DNS Cache Security > Security Services > DNS Cache
SRX > Security Subscriptions > Decrypt Profiles Security > Security Services > Decrypt Profiles
SRX > Security Subscriptions > Flow-Based Antivirus Security > Security Services > Flow-Based Antivirus
SRX > Security Subscriptions > ICAP Redirect Security > Security Services > ICAP Redirect
SRX > Security Subscriptions > IPS > IPS Profiles Security > Security Services > IPS Profiles
SRX > Security Subscriptions > IPS > IPS Signatures Security > Security Services > IPS Signatures
SRX > Security Subscriptions > SecIntel > Profile Groups Security > Security Services > SecIntel Profile Groups
SRX > Security Subscriptions > SecIntel > Profiles Security > Security Services > SecIntel Profiles
SRX > Security Subscriptions > Secure Web Proxy Security > Security Services > Secure Web Proxy
SRX > Security Subscriptions > Security Metadata Streaming > Security Metadata Streaming Policy Security > Security Services > Security Metadata Streaming
SRX > Security Subscriptions > Content Security > Web Filtering Profiles Security > Security Services > Web Filtering Profiles
Shared Services > Advanced Threat Prevention > ATP Devices Security > Advanced Threat Prevention > ATP Devices
Monitor > Reports > Advanced Threat Prevention > Generated Reports Security > Advanced Threat Prevention > ATP Generated Reports
Monitor > Reports > Advanced Threat Prevention > Report Definitions Security > Advanced Threat Prevention > ATP Report Definitions
Shared Services > Advanced Threat Prevention > Adaptive Threat Profiling Security > Advanced Threat Prevention > Adaptive Threat Profiling
Shared Services > Advanced Threat Prevention > Allowlists Security > Advanced Threat Prevention > Allowlists
Shared Services > Advanced Threat Prevention > Blocklists Security > Advanced Threat Prevention > Blocklists
Shared Services > Advanced Threat Prevention > SecIntel Feeds > DAG Filters Security > Advanced Threat Prevention > DAG Filters
Monitor > Advanced Threat Prevention > DNS Security > Advanced Threat Prevention > DNS
Monitor > Advanced Threat Prevention > File Scanning > Email Attachments Security > Advanced Threat Prevention > Email Attachments
Shared Services > Advanced Threat Prevention > Email Management > IMAP Security > Advanced Threat Prevention > Email IMAP
Monitor > Advanced Threat Prevention > Telemetry > Email Protocols Security > Advanced Threat Prevention > Email Protocols
Shared Services > Advanced Threat Prevention > Email Management > SMTP Security > Advanced Threat Prevention > Email SMTP
Monitor > Advanced Threat Prevention > Encrypted Traffic Security > Advanced Threat Prevention > Encrypted Traffic
Shared Services > Advanced Threat Prevention > SecIntel Feeds > Feeds Configuration Security > Advanced Threat Prevention > Feeds Configuration
Shared Services > Advanced Threat Prevention > File Inspection Profiles Security > Advanced Threat Prevention > File Inspection Profiles
Monitor > Advanced Threat Prevention > File Scanning > HTTP File Downloads Security > Advanced Threat Prevention > HTTP File Downloads
Monitor > Advanced Threat Prevention > Hosts Security > Advanced Threat Prevention > Hosts
Monitor > Advanced Threat Prevention > Blocked Email > IMAP Block Security > Advanced Threat Prevention > IMAP Block
Shared Services > Advanced Threat Prevention > Misc Configuration > Infected Hosts Security > Advanced Threat Prevention > Infected Hosts
Shared Services > Advanced Threat Prevention > Misc Configuration > Logging Security > Advanced Threat Prevention > Logging
Monitor > Advanced Threat Prevention > File Scanning > Manual Uploads Security > Advanced Threat Prevention > Manual Uploads
Shared Services > Advanced Threat Prevention > Misc Configuration > Proxy Servers Security > Advanced Threat Prevention > Proxy Servers
Monitor > Advanced Threat Prevention > Reverse Shell Security > Advanced Threat Prevention > Reverse Shell
Monitor > Advanced Threat Prevention > File Scanning > SMB File Downloads Security > Advanced Threat Prevention > SMB File Downloads
Monitor > Advanced Threat Prevention > Blocked Email > SMTP Quarantine Security > Advanced Threat Prevention > SMTP Quarantine
Shared Services > Advanced Threat Prevention > Misc Configuration > Threat Intelligence Sharing Security > Advanced Threat Prevention > Threat Intelligence Sharing
Monitor > Advanced Threat Prevention > Threat Sources Security > Advanced Threat Prevention > Threat Sources
Monitor > Advanced Threat Prevention > Telemetry > Web Protocols Security > Advanced Threat Prevention > Web Protocols
Shared Services > Advanced Threat Prevention > Misc Configuration > Webhook Security > Advanced Threat Prevention > Webhook
Secure Edge > Security Subscriptions > Anti-Malware Secure Edge > Anti-Malware
Secure Edge > Security Subscriptions > CASB > Application Instances Secure Edge > Application Instances
Secure Edge > Security Subscriptions > CASB > Application Tagging Secure Edge > Application Tagging
Secure Edge > Identity > Authentication Settings Secure Edge > Authentication Settings
Secure Edge > Security Subscriptions > CASB > CASB Profiles Secure Edge > CASB Profiles
Secure Edge > Service Administration > Certificate Management Secure Edge > Certificate Management
Secure Edge > Security Subscriptions > Content Filtering Secure Edge > Content Filtering
Secure Edge > Security Subscriptions > DNS Security Secure Edge > DNS Security
Secure Edge > Service Administration > Decrypt Profiles Secure Edge > Decrypt Profiles
Secure Edge > Security Subscriptions > ETI Secure Edge > Encrypted Traffic Insights
Secure Edge > Service Administration > Explicit Proxy Profile Secure Edge > Explicit Proxy Profiles
Secure Edge > Service Management > External Probe Secure Edge > External Probe
Secure Edge > Security Subscriptions > IPS Secure Edge > IPS Policy
Secure Edge > Service Management > IPsec Profiles Secure Edge > IPsec Profiles
Secure Edge > Identity > JIMS Secure Edge > JIMS
Secure Edge > Service Administration > PAC Files Secure Edge > PAC Files
Secure Edge > Security Subscriptions > SecIntel > Profile Groups Secure Edge > SecIntel Profile Groups
Secure Edge > Security Subscriptions > SecIntel > Profiles Secure Edge > SecIntel Profiles
Secure Edge > Security Policy Secure Edge > Secure Edge Policy
Secure Edge > Service Management > Service Locations Secure Edge > Service Locations
Secure Edge > Service Management > Sites Secure Edge > Service Sites
Secure Edge > Identity > User Authentication Secure Edge > User Authentication
Secure Edge > Security Subscriptions > Web Filtering Secure Edge > Web Filtering
SRX > NAT > Device View Network > NAT Management > Device NAT Policy View
SRX > NAT > NAT Policies Network > NAT Management > NAT Policies
SRX > NAT > NAT Pools Network > NAT Management > NAT Pools
CSDS Groups Inventory > CSDS Groups
SRX > Device Management > Configuration Templates Inventory > Configuration Templates
SRX > Security Policy > Device View Inventory > Device Rule View
SRX > Device Management > Devices Inventory > Devices
SRX > Device Management > Security Packages Inventory > Security Packages
SRX > Device Management > Software Images Inventory > Software Images
Monitor > Alerts > Alert Definitions Operations > Alerts > Alert Definitions
Monitor > Alerts > Alerts Operations > Alerts > Alerts
Monitor > Alerts > Tunnel Status Alert Operations > Alerts > Tunnel Status Alert
Monitor > Logs > All Security Events Operations > Logs > All Security Events
Monitor > Logs > CASB Operations > Logs > CASB
Monitor > Logs > End User Authentication Operations > Logs > End User Authentication
Monitor > Logs > Session Operations > Logs > Session
Monitor > Logs > Threats Operations > Logs > Threats
Monitor > Logs > Web Filtering Operations > Logs > Web Filtering
Monitor > Reports > Generated Reports Operations > Reports > Generated Reports
Monitor > Reports > Report Definitions Operations > Reports > Report Definitions
Monitor > Reports > Secure Edge Reports Operations > Reports > Secure Edge Reports
Monitor > Service Locations Operations > Service Locations
Administration > API Security Admin > API Security
Administration > Advanced Threat Prevention > Mapping Admin > ATP Mapping
Administration > Advanced Threat Prevention > Application Tokens Admin > ATP Application Tokens
Administration > Advanced Threat Prevention > Audit Logs Admin > ATP Audit Logs
Administration > Audit Logs Admin > Audit Logs
Administration > Data Management Admin > Data Management
Administration > Jobs Admin > Jobs
Administration > Log Streams Admin > Log Streams
Administration > Organization Admin > Organization
Monitor > Packet Capture Admin > Packet Capture
Administration > Users & Roles > Roles Admin > Roles
Administration > SSO Configuration Admin > SSO Configuration
Administration > Service Updates Admin > Service Updates
Administration > Subscriptions Admin > Subscriptions
Administration > Two-Factor Authentication Admin > Two-Factor Authentication
Administration > URL Recategorization Admin > URL Recategorization
Administration > Users & Roles > Users Admin > Users
SRX > Identity > Access Profile Admin > Identity > Access Profile
SRX > Identity > Active Directory Admin > Identity > Active Directory
SRX > Identity > Address Pools Admin > Identity > Address Pools
SRX > Identity > JIMS Admin > Identity > JIMS

Table 2 outlines the main menu in Juniper Security Director Cloud, and provides a brief overview of each item.

Table 2: GUI Menu and Description
Menu Description

Monitor

Monitor your network through customizable and interactive widgets. The dashboard enables you to select the data to be displayed on the dashboard. You can switch between general and security data.

Intelligence

Provides comprehensive visibility across key security domains and a visual representation of geographic areas for both incoming and outgoing traffic.

Security Create, deploy, and monitor security policies. You can also manage shared objects, configure VPNs, and enable a wide range of security services.
Secure Edge Manage services such as service locations, sites, IPsec profiles, and security policies, along with security subscriptions including IPS, content filtering, threat intelligence, malware protection, DNS security, and encrypted traffic inspection. You can also manage certificates, proxies, and user identities to ensure secure network access.
Network Create, edit, and monitor NAT policies and pools to control how internal and external network addresses are translated.
Inventory Manage CSDS groups, customized configurations templates, devices, security packages, and the life cycle of images of all network devices.
Operations Create, schedule, and manage alerts. You can also view and analyze security logs, and generate detailed reports on network activity and security events.
Admin Manage system settings, user accounts, roles, licenses, and subscriptions. You can also handle device configurations, auditing, data management, backups, job scheduling, and overall system maintenance from a centralized administrative interface.

Juniper Security Director Cloud Navigational Elements

Juniper Security Director Cloud offers several navigational tools within the GUI for a more tailored user experience. Table 3 displays sample icons for navigation, customization, and assistance.

Table 3: Navigational Elements
Element Icon Location
Breadcrumbs—Trace your location in the GUI. Breadcrumb navigation showing path: SRX, Device Management, Devices. Devices is highlighted as the current page.

Upper-left corner of the main screen. It is not visible on the Monitor page.

Infotip—Hover over an infotip icon for quick pop-up guidance. Question mark icon representing help or information. Various places around the GUI.
Show and Hide Left-Nav—Click the hamburger icon to show or hide the left-navigation section. Hamburger menu icon representing navigation drawer Left side of the menu bar.
Show/Hide Columns—Click the kebab icon and select the check boxes in the menu to choose which columns are visible in tabular displays. Vertical ellipsis symbol indicating additional menu options. Upper-right corner of tabular display windows, such as the Monitor menu and the Device Management menu.

Global Search—Search for specific data, such as security policies, addresses, zone, and service objects in your network. You can also search for objects in your network using full or partial keywords, such as security policies, addresses, and devices using host name, OS version, or product series. Click the result to navigate to the specific page in the GUI.

You can refine the search results for specific criteria such as date range, device type, and policy type.

Search function icon. Right side of the top bar.
Table Search—Search for specific text in the visible fields of large tabular views. Search function icon. Upper-right corner of tabular views, next to the Show/Hide Columns icon.