Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

About the All Security Events Page

To access this page, click Monitor > Logs > All Security Events.

Use this page to get an overall, high‐level view of your network environment. You can view abnormal events, attacks, viruses, or worms when log data is correlated and analyzed.

The following examples indicate the types of logs that the All Security Events page displays:

  • AV_VIRUS_DETECETED

  • IDP_ATTACK_LOG_EVENT

  • CONTENET_FILETER_BLOCKED

  • ANTISPAM_SPAM_DETECTED_MTSECINTEL_ACTION_LOG

  • AAMW_ACTION_LOG

  • SMS_MALICIOUS_VERDICT

  • RT_FLOW_SESSION_DENY

  • TUN-STATUS-ALERT

  • SECINTEL_ACTION_LOG

  • AAMW_SMS_STREAMING_LOG

This page provides administrators with an advanced filtering mechanism and provides visibility into actual events collected by the Log Collector. Using the time-range slider, you can instantly focus on areas of unusual activity by dragging the time slider to the area of interest to you. The slider and the Custom button under Time Range remain at the top of each tab. Users select the time range, and then they can decide how to view the data, using the summary view or detail view tabs.

Note:

This information is sourced from system syslog for the VPN events, and IPS, content security, firewall deny logs (when logging is enabled on policies) for all other events.

Tasks You Can Perform

You can perform the following tasks from this page:

  • View a brief summary of all events in your network. See Summary View.

  • View the comprehensive details of events in a tabular format that includes sortable columns. See Detail View.

Summary View

You can view a brief summary of all the events in your network. At the center of the page is critical information, including total number of events, viruses found, total number of interfaces that are down, number of attacks, CPU spikes, system reboots, and sessions. This data is refreshed automatically based on the selected time range.

At the bottom of the page is an area view of different events that are happening at a specific time. The events include firewall, Web filtering, VPN, content filtering, antispam, antivirus, screen, IPS, and IPsec VPN. Each event is color‐coded, with darker shades representing a higher level of activity. Each tab provides deep information like type, and number of events occurring at that specific time.

Table 1 describes the widgets on the All Events Summary View page.

Table 1: Widgets on the All Security Events Summary View Page

Field

Description

Total Events

View the total number of events that includes firewall, web filtering, IPS, IPsec VPNs, content filtering, antispam, antivirus, and screen.

Firewall

View the total number of events blocked by the firewall.

Web Filtering

View the total number of URLs permitted and blocked.

Screen

View the total number of blocked screen events.

IPS

View the data seen by the IDP engine and categorized as Critical, High, Medium.

Content Filtering

View the details of the blocked traffic.

Antispam

View the details of the blocked traffic.

Antivirus

View the details of the blocked traffic.

Detail View

Click Detail View for comprehensive details of events in a tabular format that includes sortable columns. You can sort the events using the Group By option. For example, you can sort the events based on threat severity. The table includes information such as the rule that caused the event, severity for the event, event ID, traffic information, and how and when the event was detected.

Table 2 describes the fields on the All Events Detail View Page.

Table 2: Fields on the All Events Detail View Page

Fields

Description

Time

View the time when the traffic log was generated.

Generated By

 

Traffic Session ID

View the Session ID mapped by site to an event.

User Name

View the user name.

Source IP

View the source IP address from where the event occurred (IPv4 or IPv6).

Destination IP

View the destination IP address of the event (IPv4 or IPv6).

Application

Name of the application associated with the traffic that triggered the event.

Nested Application

View the name of the Layer 7 application.

Threat Severity

View the threat severity of the event.

URL

View the accessed URL name that triggered the traffic log.

You can only recategorize the Juniper NextGen URL categories. To recategorize the URL, right-click on the URL or click More and select Request URL Categorization. The Request URL Categorization page opens. For more information on the URL recategorization, see Request URL Recategorization.

Name

View the name of the event.

Received Time

View the time when the traffic log was received by Juniper Security Director Cloud.

Policy Name

View the policy name in the log.

Event Name

View the event name of the traffic log.

Source Country

View the source country name from where the event originated.

Destination Country

View the destination country name from where the event occurred.

Source Port

View the source port of the event.

Destination Port

View the destination port of the event.

Description

View the description of the log.

Attack Name

View the attack name of the log: Trojan, worm, virus, and so on.

Category

View the event category of the traffic log (For example firewall or apptrack).

Client Hostname

Host name of the client associated with the traffic that triggered the event. For example, if a specific computer is infected, the name of that computer is displayed.

Event Category

View the event category of the traffic log (For example firewall or apptrack).

Argument

View the type of traffic. For example, FTP and HTTP.

Action

View the action taken for the event: warning, allow, and block.

Service Name

View the name of the Layer 4 service used for the traffic that triggered the event. For example, FTP, HTTP, SSH, and so on.

Source Zone

View the source zone of the site.

Destination zone

View the destination zone of the site.

Protocol ID

Protocol ID of the traffic that triggered the event.

Roles

View the role names associated with the event.

Reason

View the reason for the log generation. For example, unrestricted access.

NAT Source Port

View the source port of traffic after NAT.

NAT Destination Port

View the destination port of traffic after NAT.

NAT Source Rule Name

View the source NAT rule name.

NAT Destination Rule Name

View the destination NAT rule name.

NAT Source IP

View the source IP address after the IP address translation.

NAT Destination IP

View the destination IP address after the IP address translation.

Path Name

View the path name of the log.

Logical System Name

View the logical system name.

Rule Name

View the rule name.

Profile Name

View the name of the event profile that triggered the log.

Malware Info

Information about the malware causing the event.

Source VRF Group Name

View the source VRF group name that generated the event.

Destination VRF Group Name

View the destination VRF group name that generated the event.