Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Insights Overview

Visibility into the network environment offers actionable insights into performance, security, and reliability. By continuously analyzing data from devices, applications, and traffic flows, users can proactively detect anomalies, resolve issues, and refine performance.

Juniper Security Director Cloud offers comprehensive visibility across key security domains, such as, Applications, URL filtering, Threats, Users, Content Filtering, Anti-malware, SecIntel, DNS Security, IDP and Screens. Insights are displayed using a color-coded bubble chart, where each bubble presents specific details about the selected category. The color and size variations help you analyze complex data and troubleshoot issues. You can switch to grid format for a tabular view.

Benefits

  • Threat detection and response—Detect anomalies using real-time insights and respond to threats before security-related issues escalate.

  • Performance optimization—Monitor traffic flows and application behavior to detect and resolve network congestion, misconfigurations, and underutilized resources—boosting overall network performance.

  • Operational efficiency—Prioritize security-related issues, automate responses, and reduce MTTR to reduce outages and troubleshoot faster.

  • Anomaly detection—Detect unusual spikes in DNS queries or requests to suspicious domains which indicate signal compromise and deviation.

  • Strategic planning—Plan your network architecture capacity and security-related investments using long-term insights into usage trends and threat patterns.

Before You Begin

  • Check the device subscriptions—To view data from devices and device groups, verify the license subscription status of your devices. You should verify both Juniper Security Director Cloud subscription and the SRX Series Firewall feature licenses. The subscription and the licenses determine which insight data and licensed features—such as SecIntel and IDP—you can view. See Device Subscription and SRX Management Subscription.

    SRX Series Firewall Feature License Juniper Security Director Cloud Subscription Description
    No Trial Subscription
    • View application and user data insights.

    • Log retention is for 7days.

    Yes SRX Series Firewall Management Subscription
    • View insights from application data, user activity, and licensed features.

    • Log retention is calculated automatically based on the storage linked to the subscription.

    Yes SRX Series Firewall Management Subscription and Storage Subscription
    • View insights from application data, user activity, and licensed features.

    • Log retention is calculated automatically based on the storage linked to the subscription.

  • Check the security logs configurations—To view the monitoring and reporting data, configure the devices to stream security logs to Juniper Security Director Cloud. You can view the Insights data only if Security Logs are configured on the revenue port. See Configure Security Logs.

  • Check Junos or Apptrack logs—All raw logs must be displayed on the All Security Events page and the Sessions page. See All Security Events and Sessions.

Application Insights

You can monitor the applications running on your network and protect your network against application-level threats. It provides visibility into which applications are consuming network resources, enabling you to manage traffic by applying policies, prioritizing critical applications, or blocking unauthorized ones.

The historical data is not available on the new Application Insights page. To view historical data, see the Sessions page and the All Security Events page on the UI.

To access this page, click Monitor > Maps & Charts > Insights.

View Top Application Details

By default, you can view the top application's data for all device and device groups based on the volume. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either volume or session count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the selected application details. You can view critical information such as the total number of sessions, the bandwidth consumed by the application, the sessions denied, the risk level, the category, and the characteristic. You can also view the top five users accessing the application. Click View All Users to navigate to the User Insights page.

Figure 1: Application Insights Application Insights
Table 1: Application Insights Components
What You Can Do How
View application data based on volume or sessions. Select from the following options to view the application data:
  • Volume—Displays data based on the bandwidth consumed by an application for the selected time range.

  • Sessions—Displays data according to the number of sessions a device and device groups have generated for an application within the selected time range.

View application data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View application insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select the category from the drop-down list to filter the data based on category. For example, Web, infrastructure.

    By default, all categories are displayed on the bubble chart.

  4. Select the subcategory from the drop-down list to filter the data based on subcategory. For example, social networking, news.

    By default, all subcategories are displayed on the bubble chart.

  5. Select the characteristics from the drop-down list to filter the data based on characteristics. For example, prone to misuse, bandwidth consumed.

    By default, all characteristics are displayed on the bubble chart.

  6. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter application data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

View summary of application insights Click the View details () icon to view the top five details of the application.
Reset all application filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the applications in an ascending or descending order based on application name, status, risk level, rules, users, volume, total sessions, category, subcategory, and characteristics.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 2: Application Insights Grid Details
Field Description
Application Name The name of the application. For example, Amazon, Facebook.
Status Indicates the security policy action for the application— Permit, Reject, or Deny.
Non Standard Port Indicates that the application is using a non standard port.
Risk level The risk associated with the application—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The number of rules across devices where the application is configured.

Click the link in the Rules column to navigate to the Security Policies page. Click OK.

Users The total number of users accessing the application.

Click the link in the Users column to navigate to the User Insights page.

Volume The bandwidth used by the application.
Total Sessions The total number of application events generated by the devices.

Click the link in the Total Sessions column to navigate to the Sessions page with the filter applied for detailed logs. Click OK.

Category The category associated with the application signature. For example, Web, infrastructure.

Click the link in the Category column to view the category.

Subcategory The subcategory associated with the application signature. For example, social networking, news, advertisements.

Click the link in the Subcategory column to view the subcategory.

Characteristics The characteristics associated with the application signature. For example, prone to misuse, bandwidth consumer, capable of tunneling.

Click the link in the Characteristics column to view the characteristics.

URL Filtering Insights

URL filtering enhances visibility into network traffic by monitoring and controlling website access. It helps you defend against cyberthreat, enforce acceptable use policies, and better understand user behavior. By analyzing URL filtering logs and reports, you can detect security risks, refine network performance, and strengthen overall security posture.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select URL Filtering.

View Top URL Categories

By default, you can view the top URL category data for all device and device groups based on the users. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either users or event count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the selected URL category details. You can view critical information such as the number of URL category events generated for the device, the number of events denied, the risk level, the category, and the top five users accessing the URLs. Click View All Users to navigate to the User Insights page.

Figure 2: URL Filtering Insights URL Filtering Insights
Table 3: URL Filtering Insights Components
What You Can Do How
View URL categories based on users or events Select from the following options to view the URL category data:
  • Users—Displays data based on the number of users accessing the URL category for the selected time range.

  • Events—Displays data based on the number of events generated by the device and device groups for the URL category.

View URL category data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View URL category insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select the category from the drop-down list to filter the data based on category. For example, Web, infrastructure.

    By default, all categories are displayed on the bubble chart.

  4. Select the subcategory from the drop-down list to filter the data based on subcategory. For example, social networking, news.

    By default, all subcategories are displayed on the bubble chart.

  5. Click Apply to view the data on the bubble chart based on your settings.

    Click Reset to clear the fields and view default settings.

Filter URL category data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all URL category filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the URL categories in an ascending or descending order based on category, status, risk level, rules, total events, volume, URLs, and users.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 4: URL Filtering Insights Grid Details
Field Description
Category The name of the URL category. For example, gambling, news.
Subcategory The name of the subcategory. For example, social networking.
Status The status of the URL category—Permit or Deny
Risk Level The risk associated with the URL category—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The number of rules across devices where the URL category is configured.

Click the link in the Rules column to view the list of profile names.

Total Events The total number of URL category events generated by the devices.

Click the link in the Total Events column to navigate to the Sessions page with the filter applied for detailed logs.

URLs The total number of URLs for a specific category and subcategory.

Click the link in the URLs column to view the list of URLs.

Users The total number of users accessing the URLs.

Click the link in the Users column to navigate to the User Insights page.

Threats Insights

Threat delivers real-time and historical threat visibility. Threat visibility in network monitoring is crucial for early threat detection and effective incident response. By providing a clear view of network traffic and behavior, you can identify anomalies, malicious activity, and potential vulnerabilities to proactively mitigate risks and minimize damage from security incidents.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select Threats.

View Top Threat Details

By default, you can view the top threat data for all device and device groups based on the users. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either users or events count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the selected threat details. You can view critical information such as the total number of threat events, the users impacted by the threat, the aggregate threat events that were denied and permitted, and the risk level of the threat. The bandwidth consumed is shown for content filtering security service only.

Figure 3: Threats Insights Threats Insights
Table 5: Threat Insights Components
What You Can Do How
View threat data based on users or events. Select from the following options to view the threat data:
  • Users—Displays data based on the number of users impacted by the threat for the selected time range.

  • Events—Displays data based on the number of events generated by a device or device groups for a security service during the selected time range.

View threat data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View threat insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select the threat from the View drop-down list to filter the data based on threat. For example, Antivirus, Content Filtering.

    By default, all threats are displayed on the bubble chart.

  4. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter threat data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device and device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all threat filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort threats in an ascending or descending order based on the security service, status, risk level, rules, total events, users, source host, and destination host.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 6: Threat Insights Grid Details
Field Description
Security Service The type of threat. For example, IDP, Antivirus.
Max Risk Level The risk associated with the threat—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The number of rules configured across devices for the security service.

Click the link in the Rules column to view the list of rule names or profile names configured for the security policy.

Total Events The total threat events generated by the device.

Click the link in the Total Events column to navigate to the All Security Events page with the filter applied for detailed logs. Click OK.

Users The total number of users accessing the security services.

Click the link in the Users column to navigate to the User Insights page.

URLs The source IP address from where the threat is originated.

Click the link in the URLs column to view the URL for the security services.

Destination Host The target IP address to which the threat is destined.

Click the link in the destination host column to display the destination IP addresses.

User Insights

User visibility provides identity-based analytics that correlate security events with individual users.

The historical data is not available on the new User Insights page. To view historical data, see the Sessions page and the All Security Events page on the UI.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select User.

View Top User Details

By default, you can view the top users' data for all device and device groups based on the volume. The data can be presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either volume or session count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the selected user details. You can view critical information such as the total number of events, the bandwidth consumed, and the top five applications accessed by the user. Click View All Applications to navigate to the Application Insights page.

Figure 4: User Insights User Insights
Table 7: User Insights Components
What You Can Do How
View users based on volume or sessions Select from the following options to view the user data:
  • Volume—Displays data based on the bandwidth consumed by the user for the selected time range.

  • Sessions—Displays data based on the number of sessions generated by devices and device groups for a user during the selected time range.

View user data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

Filter user data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device and device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all user filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort users in an ascending or descending order based on the username, rules, volume, total sessions, total rejects, applications, URL filtering, content filtering, anti-malware, SecIntel, DNS Security, IDP and screen.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 8: User Insights Grid Details
Field Description
Username The name of the user or source IP address accessing the application.
Rules The number of rules across devices where the user is configured.

Click the Rules link to view the list of policies.

Volume The bandwidth consumed by the user.
Total Sessions The total number of sessions generated by the device for the given user.

Click the link in the Total Sessions column to navigate to the Sessions page for detailed logs. Click OK.

Total Rejects The total number of deny and reject events for the user across all threats and sessions.
Applications The number of applications accessed by a specific user.

Click the link in the Application column to navigate to the Application Insights page.

URL Filtering The number of URL categories accessed by a specific user.

Click the link in the URL Filtering column to navigate to the URL Filtering Insights page.

Content Filtering The number of content filters accessed by a specific user.

Click the link in the Content Filtering column to navigate to the Content Filtering Insights page.

Anti-Malware The number of anti-malwares accessed by the user.

Click the link in the Anti-Malware column to navigate to the Anti-Malware Insights page.

SecIntel The number of SecIntel categories accessed by the user.

Click the link in the SecIntel column to navigate to the SecIntel Insights page.

DNS Security The number of DNS Security categories accessed by the user.

Click the link in the DNS Security column to navigate to the DNS Security Insights page.

IDP & Screens The number of IDP & Screen services accessed by the user.

Click the link in the IDP & Screens column to navigate to the IDP & Screens Insights page.

Content Filtering Insights

Content filtering offers more than just blocking unwanted websites—it provides deep visibility and actionable insights into how users interact with digital content across a network.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select Content Filtering.

Top Content Filter Details

By default, you can view the top content filter data for all device and device groups based on the volume. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either volume or events count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the selected content filter file type details. You can view the total number of events generated for a file type, the bandwidth consumed, the aggregate denied and permitted events for a file type.

Figure 5: Content Filtering Insights Content Filtering Insights
Table 9: Content Filtering Insights Components
What You Can Do How
View content filter insights based on volume or events Select from the following options to view the content filter data:
  • Volume—Displays data based on the bandwidth consumed by the file type for the selected time range.

  • Events—Displays data based on the number of events generated by devices and device groups.

View content filter data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View content filter insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the status from the drop-down list to filter the data based on status. By default, data for all statuses are displayed on the bubble chart.

    The status drop-down list displays all distinct actions identified in security log events within the selected time range. These actions are extracted from syslogs linked to various attack types. If no relevant log events are detected during the specified period, the drop-down list remains empty.

  3. Select the File Type value from the drop-down list to filter the data based on file type. For example, ZIP, PDF.

    By default, all file types are displayed on the bubble chart.

  4. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter data for content filter

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart.

Click Reset to clear the fields on the Filters page.

Reset all filter for content filter Click the Reset all filters () icon to reset all filters to default. The bubble chart is refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the content filtering data in an ascending or descending order based on file type, status, rules, volume, total events, URLs, and users.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 10: Content Filtering Insights Grid Details
Field Description
File Type The content filter file type. For example, PDF, XML.
Status The status of the configured content filter—All, Block, Close Client, Close Client Server, Close Server, No Action.
Rules The number of rules across devices where content filtering file type is configured.

Click the link in the Rules column to view the list of profile names.

Volume The bandwidth consumed by the content filter file type.
Total Events The total number of events generated by the devices.

Click the link in the Total Events column to navigate to the All Security Events page for detailed logs. Click OK.

URLs The total number of URLs for specific file type.

Click the link in the URLs column to view the list of URLs.

Users The total number of users accessing the specific file type.

Click the link in the Users column to navigate to the User Insights page.

Anti-Malware Insights

Anti-malware offers malware detection, prevention, and remediation. Effective network monitoring integrates anti-malware insights to detect, analyze, and respond to malicious behavior in real-time.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select Anti-Malware.

Top Anti-Malware Details

By default, you can view the top anti-malware, the anti-virus, and the ATP file scan data for all device and device groups based on the users. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either users or events count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the selected malware details. You can view the total events generated by the device, the total users impacted by the malware, the risk associated, the number of malwares denied, or permitted.

Figure 6: Anti-Malware Insights Anti-Malware Insights
Table 11: Anti-Malware Insights Components
What You Can Do How
View anti-malware data based on users or events Select from the following options to view anti-malware data:
  • Users—Displays data based on the users triggering the malware for the selected time range.

  • Events—Displays data based on the number of events generated by devices and device groups for a malware during the selected time range.

View anti-malware data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View anti-malware insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select an option to filter the data based on which you want to view the anti-malware data.

    By default, all anti-malwares are displayed on the bubble chart.

  4. Select the status of the malware from the drop-down list to filter the data based on status.

    By default, malware with all the statuses is displayed on the bubble chart.

  5. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter anti-malware data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups, or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the anti-malware data in an ascending or descending order based on malware name, status, risk level, rules, total events, users, source host, destination host, and destination country.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 12: Anti-Malware Insights Grid Details
Field Description
Malware Name The name of the malware.
Status The status—All, Block, Deny, Permit, Unknown
Risk Level The risk associated with the malware—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The number of rules across devices where the malware is configured.

Click the link in the Rules column to view the list of rules.

Total Events The total number of malware events generated for the devices.

Click the Total Events link to navigate to the All Security Events page with the filter applied for detailed logs. Click OK.

Users The total number of users who triggered the anti-malware event.

Click the link in the Users column to navigate to the Users Insights page.

Applications The number of HTTP files scanned for the configured period.

Click the link in the Applications column to navigate to the Application Insights page.

Source Host The source host IP addresses where the malware is originated.

Click the link in the Source Host column to view the list of source host IP addresses.

Destination Host The destination host IP addresses where the malware is destined.

Click the link in the Destination Host column to view the list of destination host IP addresses.

Destination Country The country where malware is destined to.

Click the link in the Destination Country column to view the list of destination countries.

SecIntel Insights

In a threat environment marked by constant evolution, integrating SecIntel into network monitoring elevates both visibility and responsiveness. SecIntel provides enriched context about adversary tactics, techniques, and infrastructure—transforming raw data into actionable intelligence. SecIntel leverages global threat feeds to enhance contextual visibility.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select SecIntel.

Top SecIntel Details

By default, you can view the top SecIntel data for all device and device groups based on the users. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either users or event count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the number of events generated for the SecIntel category, the numbers of users impacted, the associated risk, the number of events denied, and the number of events permitted.

Figure 7: SecIntel Insights SecIntel Insights
Table 13: SecIntel Insights Components
What You Can Do How
View SecIntel data based on users or events Select from the following options to view the SecIntel data:
  • Users—Displays data based on the users impacted by the SecIntel category for a particular time range.

  • Events—Displays data on the bubble chart based on the number of events generated by the devices and device groups.

View SecIntel data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View SecIntel insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select the status of the SecIntel category from the drop-down list to filter the data based on category.

    By default, SecIntel category with all the statuses are displayed on the bubble chart.

  4. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter SecIntel data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all SecIntel filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the SecIntel data in an ascending or descending order based on the category name, status, risk level, rules, total events, users, source host, destination host, and destination country.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 14: SecIntel Insights Grid Details
Field Description
Category Name The SecIntel category name. For example, Block-list.
Status The status of the SecIntel category—All, Permit
Risk Level The risk associated with the SecIntel category—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The number of rules across devices where the SecIntel category is configured.

Click the link in the Rules column to view the list of rules.

Total Events The total number of events generated by the devices for the SecIntel category.

Click the link in the Total Events page to navigate to the All Security Events page for detailed logs. Click OK.

Users The number of users impacted by the SecIntel category.

Click the link in the Users column to navigate to the Users Insights page.

Applications For example, DHCP application.

Click the link in the Application column to navigate to the Application Insights page.

Source Host The number of source hosts where the SecIntel category is originated.

Click the link in the Source Host column to view the number of source host IP addresses.

Destination Host The number of destination hosts where the SecIntel category is targeted.

Click the link in the Destination Host column to view the list of destination host IP addresses.

Destination Country The number of destination countries where the SecIntel category is targeted.

Click the link in the Destination Country column to view the destination country names.

Feeds The unique identifier for a threat feed. The feed names are used to organize and manage various threat intelligence sources.

Click the link in the Feeds column to view the feeds.

DNS Security Insights

DNS security insights play a vital role in modern network monitoring by enabling proactive analysis of DNS traffic. This visibility helps detect malicious domains, prevent data exfiltration, and uncover indicators of compromise in real time. By scrutinizing DNS query patterns and responses, you can identify anomalies, diagnose performance congestion, and strengthen the overall security posture of your infrastructure. Enhanced DNS visibility ensures greater reliability, responsiveness, and protection across network resources.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select DNS Security.

View DNS Security Details

By default, you can view the top DNS Security data for all device and device groups based on the users. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either users or events count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the total number of events generated for the DNS Security, the total number of users using DNS Security category name, the risk associated, the total DNS security category events denied, and the total DNS security events permitted.

Figure 8: DNS Security Insights DNS Security Insights
Table 15: DNS Security Insights Components
What You Can Do How
View DNS Security data based on users or events Select from the following options to view the DNS Security data:
  • Users—Displays data based on the users for a selected time range.

  • Events—Displays data based on the number of events generated by the device and device groups.

View DNS Security data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View DNS Security insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select the status of the DNS category from the drop-down list to filter the data based on status.

    By default, DNS Security category with all the statuses are displayed on the bubble chart.

  4. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter DNS Security data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all DNS Security filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the DNS Security in an ascending or descending order based on category name, status, risk level, rules, total events, users, source host, destination host, and destination country.

If the data presented on the bubble chart is not visible within the grid, sort the grid by the appropriate column or use the search functionality to efficiently filter and retrieve the required information.

Table 16: DNS Security Insights Grid Details
Field Description
Category Name The name of the DNS category.
Status The status of the DNS queries.
Risk Level The risk associated with the DNS Security category—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The total number of rules configured for the DNS category across all devices.

Click the link in the Rules column to view the list of rules.

Total Events The total number of events generated by the device for the DNS Security category.

Click the link in the Total Events column to navigate to the All Security Events page for detailed logs. Click OK.

Users The total number of users querying the DNS security category.

Click the link in the Users column to navigate to the User Insights page.

Source Host The source IP address from where the DNS security query was initiated.

Click the link in the Source Host column to view the list of source host IP addresses.

Destination Host The destination IP address to which the DNS security query was targeted.

Click the link in the Destination Host column to view the list of destination host IP addresses.

Destination Country The destination country to which the DNS security query was targeted.

Click the link in the Destination Country column to view the list of destination countries.

Feeds Provides information about malicious or potentially dangerous domain names.

Click the link in the Feeds column to view the list of Feeds.

IDP and Screens Insights

IDP enhances visibility by monitoring network traffic, analyzing behavior, detecting anomalies and malicious activities. This visibility helps you identify vulnerabilities, respond to threats in real-time, and strengthen your overall security posture.

Screens allow you to view real-time network traffic, identify performance congestion, and detect security threats.

To access this page, click Monitor > Maps & Charts > Insights and then from the Insights drop-down list, select IDP and Screens.

View IDP and Screens Details

By default, you can view the top IDP and Screen data for all device and device groups based on the user. The data is presented graphically as a zoomable bubble graph. Bubble sizes vary depending on the selected metric—either users or event count. The data is refreshed automatically based on the selected time range.

Click the bubble to view the total number of events generated by the device for the IDP and Screens attack, the total number of users, the risk level of the attack, the total events denied, and the total events permitted.

Figure 9: IDP and Screens Insights IDP and Screens Insights
Table 17: IDP and Screens Insights Components
What You Can Do How
View IDP and Screens data based on users or events Select from the following options to view the IDP and Screens attack data:
  • Users—Displays data based on the users impacted by the IDP and Screens attack for a particular time range.

  • Events—Displays data based on the number of events generated by the device and device groups.

View IDP and Screens data for a time range Click the calendar () icon to select the time range to view data and click OK.

The maximum time range is 30 days.

View IDP and Screen insights based on your settings
  1. Click the View settings () icon.

    The View Settings panel is displayed.

  2. Select the risk level option. You can view data by All, Critical, High, Moderate, Low, and None.

    By default, data for all risk levels is displayed on the bubble chart.

  3. Select an option to filter the data based on IDP or Screen.

    By default, data for all is displayed.

  4. Select the attack status from the drop-down list to filter the data based on status.

    By default, you can view data for all statuses.

    The status drop-down list displays all distinct actions identified in security log events within the selected time range. These actions are extracted from syslogs linked to various attack types. If no relevant log events are detected during the specified period, the drop-down list remains empty.

  5. Click Apply to view filtered data on the bubble chart based on your selections.

    Click Reset to clear the fields and view default settings.

Filter IDP and Screens data

To view specific data, filter based on the device, device groups, or zones.

To save filters:
  1. Click the filter () icon.

    The Filter page is displayed.

  2. Select Device and Device Groups, Zones and click Save Filter to save the filter of your choice.

    The Save Filter pop-up is displayed.

  3. Enter the filter name and click Save.

    The filter is saved on the Saved Filter page.

  4. Click the View saved filters icon on the Filters page to view the saved filter.

    The Saved Filters page is displayed. On the Saved Filters page, you can:

    • View saved filters and sort filters by the filter name.

    • Click the delete () icon to delete any filter.

    • Click the icon on the top-left of the browser to navigate to the Insights page.

To view data instantly based on the device, device groups or zones, select the values on the Filter page and click Apply. The data is refreshed on the bubble chart and the grid.

Click Reset to clear the fields on the Filters page.

Reset all IDP and Screen filter Click the Reset all filters () icon to reset all filters to default. The bubble chart and the grid details are refreshed accordingly.

Data can also be viewed in a sortable grid format, allowing easy comparison across columns. You can sort the IDP and Screens data in an ascending or descending order based on attack name, status, risk level, rules, total events, users, destination host, source host, and source country.

If the data shown in the bubble chart is not visible in the grid, try sorting the grid by the relevant column or use the search function to quickly filter and locate the required information.

Table 18: IDP and Screens Insights Grid Details
Field Description
Attack Name The name of the IDP and Screens attack.
Status Indicates the action taken in response to an IDP or Screen attack, as recorded in the syslog. For example, DROP_PACKET, LOG, CLOSE_CLIENT.
Risk Level The risk associated with the attack—Critical, high, moderate, low, and none. The risk levels are indicated by color codes.
  • Critical—

  • High—

  • Moderate—

  • Low—

  • None—

Rules The number of rules configured for the attack name across devices.

Click the link in the Rules column to view the rules.

Total Events Indicates the total number of syslog events captured when an attack is detected across devices.

Click the link in the Total Events column to navigate to the All Security Events page for detailed logs.

Users The number of users impacted by the attack.

Click the link in the Users column to navigate to the User Insights page.

Applications For example, HTTP, HTTPS applications.

Click the link in the Applications column to navigate to the Application Insights page.

Destination Host The destination IP address to which the attack was destined.

Click the link in the Destination Host column to view the list of destination host IP addresses.

Source Host The source IP address from where the attack was originated.

Click the link in the Source Host column to view the list of source host IP addresses.

Source Country Shows the country of origin for the attack, as determined by Geo-IP lookup. The source IP is mapped using IANA IP allocation data to identify its geographical location.

Click the link in the Source Country column to view the source countries.