Dashboard Overview
Juniper Security Director Cloud enables you to monitor your network through customizable and interactive widgets. The new dashboard enables you to select the data displayed on the dashboard. You can switch between general and security data.
The new general and security dashboards provide a comprehensive analysis of your network trends based on the latest logs. These dashboards offer improved visualization and insights compared to previous versions. However, if you need to access trends from logs generated before these new dashboards were implemented, click View Historical Data on the top-right corner
General Data
The dashboard provides a customizable view of general network data through interactive widgets. You can view data for the last 30 days and filter information based on device name, device groups, or zones. You can filter the data by zones only after you select a device or device group.
| Widget | GUI View | Description |
|---|---|---|
| Threats Blocked | ![]() |
Number of threats blocked. |
| Traffic Inspected | ![]() |
Volume of traffic inspected for threats. |
| SRX Devices Managed | ![]() |
Total number of managed devices and the number of devices not
connected to Juniper Security Director Cloud. The device count is based
on the statuses displayed in the Management
Status column on the Devices page. For example, the screenshot indicates that 84 devices are managed by Juniper Security Director Cloud and 22 out of the 84 devices are not connected to Juniper Security Director Cloud. |
| Log Storage Usage | ![]() |
Percentage of the system log storage space used. |
| SD Users | ![]() |
Number of users. |
| SD Critical Alerts | ![]() |
Number of alerts created for critical threats. |
| Top Application Visibility by Volume | ![]() |
Top 50 applications based on volume of traffic inspected. The
bubble color depends on the highest severity threat detected. Hover
over a bubble to view the volume inspected for the
application. The possible values and corresponding color codes are:
When you click a bubble or the widget, you are redirected to the Applications Insights page for the same time period and global filters preselected. You can then interact with the bubble chart or the table to view application-specific information. |
| SRX Device Health Status | ![]() |
Status of the managed devices based on percentage of resources used such as CPU processing power, memory, and storage. The color coding and status is based on the Device Health Status column in the Devices page. The possible values are:
When you click the device name, you are redirected to the device-specific details page. When you click the device count or the legend, you are redirected to the Devices page with the corresponding devices. |
| Threat Summary | ![]() ![]() |
Number of critical, high, and medium category threats detected by a security service in a zone. Interact with the chart to drill down or drill up the data. When you click the threat type or security service, a View details link is displayed. The link redirects you to the Threats Insights page with pre-selected filters. But, when you click a zone, you are automatically redirected to the Threats Insights page. For example, the screenshot indicates that critical threats were detected by DNS Security service in, SecIntel, IDP, and Advanced Anti-Malware services. It also indicates the corresponding zones where the threats were detected. |
| Alerts | ![]() ![]() |
Number of critical and major alerts raised across seven equal
intervals within the selected duration. Hover over the bar to view
the number of alerts. For example, when you filter the data to the last 14 days, the graph displays data divided into seven equal intervals of two days each. If alert definitions were not created, no alert information is displayed and you are prompted to create alert definitions. When you click Create Alert Definitions, you are redirected to the Alert Definitions page. See Create and Manage Alert Definitions. |
| User Activity Visibility by Volume | ![]() |
Volume of traffic inspected for the top 50 users. Hover over a
bubble to view the traffic volume for the user. When you click a bubble or the widget, you are redirected to the Users Insights page for the same time period and global filters preselected. You can then interact with the bubble chart or the table to view user-specific information. |
| Top 5 URL Activity | ![]() ![]() |
Number of events per top 5 URL categories across seven equal
intervals within the selected duration. For example, when you filter the data to the last 14 days, the graph displays data divided into seven equal intervals of two days each. When you click the dots in the graph, the All Security Events page is displayed with pre-selected filters. When you click the widget, you are redirected to the URL Filtering Insights page. You can also interact with the legends to view information for all or specific URL categories. |
Security Data
The dashboard provides a customizable view of your network security data through interactive widgets. You can view data for the last 30 days and filter information based on device name, device groups, or zones. You can filter the data by zones only after you select a device or device group.
| Widget | GUI View | Description |
|---|---|---|
| Firewall Sessions | ![]() |
Number of sessions inspected for threats. |
| Threats Blocked | ![]() |
Number of threats blocked. |
| Infected Hosts | ![]() |
Number of hosts infected by critical threats. |
| SRX Devices Managed | ![]() |
Total number of managed devices and the number of devices not
connected to Juniper Security Director Cloud. The device count is based
on the statuses displayed in the Management
Status column on the Devices page. For example, the screenshot indicates that 84 devices are managed by Juniper Security Director Cloud and 22 out of the 84 devices are not connected to Juniper Security Director Cloud. |
| Threat View | ![]() |
|
| Threat Summary | ![]() ![]() |
Number of critical, high, and medium category threats detected by a security service in a zone. Interact with the chart to drill down or drill up the data. When you click the threat type or security service, a View details link is displayed. The link redirects you to the Threats Insights page with pre-selected filters. But, when you click a zone, you are automatically redirected to the Threats Insights page. For example, the screenshot indicates that critical threats were detected by DNS Security service in, SecIntel, IDP, and Advanced Anti-Malware services. It also indicates the corresponding zones where the threats were detected. |
| Top Security Events | ![]() |
Number of top 10 security events by event type. Hover over the bars to view the number of events in a type. |
| Infected Hosts | ![]() |
Number of hosts detected with critical threats across seven equal
intervals within the selected duration. Hover over the bars to view
the number of hosts. For example, when you filter the data to the last 14 days, the graph displays data divided into seven equal intervals of two days each. |
Historical Data Dashboard
The old dashboard provides a customizable view of network services data through interactive widgets.
-
Juniper Security Director Cloud doesn't update the old dashboard with logs generated after the new dashboard is implemented.
-
Use the old dashboard only to view your network data and trends until the new dashboard is released. You can also use the old dashboard to view widgets that are not updated based on the device logs.
-
Juniper Security Director Cloud displays a banner to indicate the number of days after which the old dashboard data becomes obsolete.
-
To view the latest data and trends, click Dashboard in the main menu.
|
Widget |
Description |
|---|---|
| C&C Server and Malware Source Locations |
Displays a world map showing the number of threat event count across countries. |
| Top Infected File Categories |
Displays a graph of the top infected file categories. |
| Top Scanned File Categories |
Displays a graph of the top file types scanned for malware. |
| Top Malware Identified |
Displays the top malware found based on the number of times the malware is detected over a period of time. |
| Top Compromised Hosts |
Displays the top compromised hosts based on their associated threat level and blocked status. |
|
VPN Tunnel Status |
Displays the status of the VPN tunnels. |
|
Devices Connection Status |
Displays the connection status of devices. You can filter the widget by the connection status. |
|
Devices by OS Versions |
Displays devices based on the software versions. You can filter the widget by the software version. |
|
Devices by Platforms |
Displays devices based on the device platform. You can filter the widget by the platform. |
|
Device Subscriptions Status |
Displays the subscription status of devices. You can filter the widget by the subscription status. |
|
Device Management Entitlements |
Displays the subscriptions based on devices associated with the subscriptions. You can filter the widget by used or unused subscriptions. |
|
Overall Storage |
Displays the storage used by the organization of the user. |
|
Threat Map: IPS |
Displays a world map showing total IPS event count across countries. You can sort the information based on the source, the destination, and the time period. |
|
Threat Map: Virus |
Displays a world map showing the total virus event count across countries. You can sort the information based on the source, the destination, and the time period. |
|
Firewall: Top Events |
Displays a bar chart of the top firewall events of the network traffic sorted by count. You can sort the information based on the time period. |
|
Firewall: Top Denials |
Displays a column chart of the top requests denied by the firewall based on the source IP addresses sorted by count. You can sort the information based on the time period. |
|
IP: Top Sources |
Displays the top IP source addresses of the network traffic sorted by count. You can sort the information based on the time period. |
|
IP: Top Destinations |
Displays the top IP destination addresses of the network traffic sorted by count. You can sort the information based on the time period. |
|
NAT: Top Source Translations |
Displays the top source IP addresses that are translated sorted by count. You can sort the information based on the time period. |
|
NAT: Top Destination Translations |
Displays the top destination IP addresses that are translated sorted by count. You can sort the information based on the time period. |
|
Top Source IPs by Volume |
Displays the top source IP addresses based on the volume of traffic sorted by count. You can sort the information based on time period. |
|
Virus: Top Blocked |
Displays viruses with the maximum number of blocks sorted by count. You can sort the information based on the time period. |
|
Web Filtering: Top Blocked |
Displays a bar chart of websites with the maximum number of blocks sorted by count. You can sort the information based on the time period. |
|
Applications: Most Sessions |
Displays a bar chart of the top applications with a maximum number of sessions sorted by count. You can sort the information based on the time period. |
|
Top Applications by Volume |
Displays the applications based on volume of traffic sorted by count. You can sort the information based on the time period. |
|
Top Spams by Source |
Displays the number of spams detected by the source IP addresses. You can sort the information based on the time period. |
|
IPS: Top Attacks |
Displays the top IPS events of the network traffic sorted by count. You can sort the information based on the time period. |
| Widget | Description |
|---|---|
| Top 5 Users by Bandwidth |
Displays the top 5 users by bandwidth usage. You can sort the information based on the time period. |
| Top 5 Service Locations by Users |
Displays the top 5 service locations by number of users. You can sort the information based on the time period. |
| Top 3 Sites by Bandwidth |
Displays the top 3 sites by bandwidth usage. You can sort the information based on the time period. |
| Top 3 Service Locations by Bandwidth |
Displays the top 3 service locations by number of users. You can sort the information based on the time period. |
| Top 5 Sites by Users |
Displays the top 5 sites by number of users. You can sort the information based on the time period. |
| Overview |
Displays the average bandwidth usage and percentage of users. You can sort the information based on the time period. |
| Monitored Tunnels Up/Down | Displays all the tunnels with their current status. |
| Total Service Locations | Displays all the service locations with their current status |
| Log Streaming Volume |
Displays the percentage of the log streaming data budget used. When you exceed the limit and use data from the grace buffer, the data usage percentage exceeds 100%. |
|
Sanctioned and Unsanctioned Applications |
Displays the sanctioned and unsanctioned applications sorted by count. You can do the following tasks:
|
|
Sanctioned and Unsanctioned Application Instances |
Displays the sanctioned and unsanctioned application instances sorted by count. You can do the following tasks:
|
|
Applications: Most Sessions |
Displays a bar chart of the applications with a maximum number of sessions sorted by count. You can do the following tasks:
|
|
Top Applications by Volume |
Displays the applications based on volume of traffic sorted by count. You can do the following tasks:
|
|
Application Instance Categories |
Displays a chart of the application instance categories. You can do the following tasks:
|
|
Application Summary |
Displays the application summary details of users, volume, and session. You can do the following tasks:
|




















