Dashboard
|
The dashboard displays information such as top events, top denials, top
applications, top source and destination IP addresses, top traffic, and top infected
hosts.
Graphical security widgets provide you with personalized network security views.
You can customize your dashboard layout by adding, removing, and rearranging these
widgets. See About the Dashboard.
|
Monitor
|
- Alerts—Alerts inform you about major events in the
system. You can define alert parameters using a range of predefined filters. See
Alerts Overview.
- Logs—Managed devices generate traffic logs that you can
examine for details on security events stemming from IPS policies, Web filtering
policies, and IPSec VPN policies. Additionally, these logs provide a comprehensive
overview of your network environment. By correlating and analyzing log data, you
can identify abnormal events, attacks, viruses, or worms. See About the Session Page.
- Maps and Charts—The threat map offers a visual
representation of geographic areas for both incoming and outgoing traffic. You can
view blocked and allowed threat events using data from IPS, antivirus, and
antispam engines. See Threat Map Overview.
- Reports—Reports summarise network
activity and overall status, aiding in trend analysis of traffic patterns. You can
use predefined reports or create custom ones to meet specific needs. See Reports Overview.
|
SRX > Device Management
|
-
Devices—Discover and manage devices. See Devices Overview.
-
Configuration Templates—Manage configuration settings
during onboarding and throughout the devices' life cycle for Juniper Networks
and other third-party devices. Use configuration templates to apply tailored
configurations to these devices. See Configuration Templates Overview.
-
Software Images—Use software installation packages to
update or revert the operating system on a network device. Juniper Security Director Cloud assists in managing the complete lifecycle of software
images for all managed network devices, including adding, staging, deploying,
and deleting them. See Software Images Overview.
-
Security Packages—View the latest security packages
available on Juniper Security Director Cloud on the Security Packages page, check
the security packages currently installed on your device, and install the latest
ones. The security packages include IPS Signatures, Application Signatures, and
URL Categories. See Security Packages Overview.
|
SRX > Security Policy
|
-
SRX Policy—Implement security by applying rules to the
traffic passing through a device. Traffic is allowed or blocked depending on the
actions specified in the security policy rules. You can create, edit, and delete
security policies and link devices to these policies. See Security Policies Overview.
-
Device View—View detailed information about the number
of rules and policies allocated to each device. See Devices with Security Policies Main Page Fields.
|
SRX > Security Subscriptions
|
Manage advanced security related to:
|
SRX > IPsec VPN
|
IPsec VPN—Manage IPsec VPN profiles to securely connect
with remote computers over a public WAN like the Internet. See IPsec VPN Overview. |
SRX > NAT
|
-
NAT Policies—Create, modify, clone, and delete NAT
policies and their associated rules. You can also filter and organize this
information to gain a clearer understanding of your desired configurations. See
NAT Policies Overview.
-
NAT Pools—Define NAT pools for address translation. NAT
pools comprise a group of IP addresses designated for address translation. NAT
policies facilitate this process by converting internal IP addresses to the IP
addresses in the NAT pools. See NAT Pools Overview.
|
SRX > Identity
|
- JIMS—Retrieve comprehensive user identities from various
authentication sources for SRX Series Firewalls on the Identity Management
Profile. You can create, modify, clone, remove, and deploy identity management
profiles. See JIMS Identity Management Profile Overview.
- Active Directory—Configure Active Directory server
profiles for the SRX Series Firewalls to contact the Active Directory servers. You
can view, create, modify, clone, and delete Active Directory profiles. See Active Directory Profile Overview.
- Access Profiles—Configure access profiles for network
access and authentication settings. Juniper Security Director Cloud supports RADIUS,
LDAP, and local authentication methods. See Access Profile Overview.
- Address Pools—Create centralized IPv4 address pools
separately from the client applications using the address pools. An address pool
consists of IP addresses that can be allocated to users, such as in DHCP setups.
See Address Pools Overview.
|
Shared Services > Firewall
Profiles
|
Manage security related to:
- Rule Options—Define objects to set redirect options,
authentication parameters, TCP options, and actions for both translated and
untranslated destination-address packets. Upon creating rule options, Juniper Security Director Cloud generates objects in its database to represent these
rule options. See Rule Options Overview.
- Redirect Profiles—Create a redirect profile and explain
the policy action or direct user requests to an informative webpage. See Redirect Profiles Overview.
|
Shared Services > Objects
|
Mange objects related to:
- Addresses—Create addresses and address groups that are
used in security and NAT services. You can create, edit, and delete addresses and
address groups. See Addresses Overview.
- GeoIP—Create IP-based geolocation (GeoIP) feeds in
security policies to deny or allow traffic based on the source or the destination
IP address. You can create, modify, or delete the GeoIP feeds. See GeoIP Overview.
- Services—Manage applications across multiple devices. A
service refers to an application on a device, such as Domain Name Service (DNS).
See Services Overview.
- Applications—Manage application signature groups. You can
create, modify, clone, and delete application signature groups. You can also view
the details of predefined application signatures that are downloaded. See Aplication Signatures Overview.
- Schedules—Create schedules for security policies to be
active only during the scheduled time or link policies to existing schedules. See
Schedules Overview.
- URL Patterns—Create URL patterns that contain a list of
URLs. You can create, edit, clone, and delete URL patterns. See URL Patterns Overview.
- URL Categories—Create URL categories that contain a list
of URL patterns which are grouped under a single title. You can create, edit,
clone, and delete URL categories. See URL Categories Overview.
|
Administration
|
Perform administrative tasks related to:
- Subscriptions—Manage your Juniper Security Director Cloud
subscriptions. See Subscriptions Overview.
- Users and Roles—Manage authentication and role-based
access control (RBAC) to Juniper Security Director Cloud's resources and services. See
About the Users Page.
- Jobs—Monitor the status of jobs executed or scheduled in
Juniper Security Director Cloud. You can configure jobs to run immediately or later.
See Jobs Management in Juniper Security Director Cloud.
- Audit logs—Use audit logs to trace events and to maintain
historical data. An audit log is a record of a sequence of activities that have
affected a specific operation or procedure. See About the Audit Logs Page.
- Data Management—View device logs related to security and
data traffic on the Data Management page. You can export or delete these logs. See
About the Data Management Page.
- Organization—Manage your organization account's devices
and subcriptions. Administrators, operators, or users with read-only access of
organizations can create multiple organization accounts in Juniper Security Director Cloud. See About the Organization Page.
|