ON THIS PAGE
About the All Security Events Page
To access this page, click Monitor > Logs > All Security Events.
Use this page to get an overall, high‐level view of your network environment. You can view abnormal events, attacks, viruses, or worms when log data is correlated and analyzed.
The following examples indicate the types of logs that the All Security Events page displays:
-
AV_VIRUS_DETECETED
-
IDP_ATTACK_LOG_EVENT
-
CONTENET_FILETER_BLOCKED
-
ANTISPAM_SPAM_DETECTED_MTSECINTEL_ACTION_LOG
-
AAMW_ACTION_LOG
-
SMS_MALICIOUS_VERDICT
-
RT_FLOW_SESSION_DENY
-
TUN-STATUS-ALERT
-
SECINTEL_ACTION_LOG
-
AAMW_SMS_STREAMING_LOG
This page provides administrators with an advanced filtering mechanism and provides visibility into actual events collected by the Log Collector. Using the time-range slider, you can instantly focus on areas of unusual activity by dragging the time slider to the area of interest to you. The slider and the Custom button under Time Range remain at the top of each tab. Users select the time range, and then they can decide how to view the data, using the summary view or detail view tabs.
This information is sourced from system syslog for the VPN events, and IPS, content security, firewall deny logs (when logging is enabled on policies) for all other events.
Tasks You Can Perform
You can perform the following tasks from this page:
-
View a brief summary of all events in your network. See Summary View.
-
View the comprehensive details of events in a tabular format that includes sortable columns. See Detail View.
Summary View
You can view a brief summary of all the events in your network. At the center of the page is critical information, including total number of events, viruses found, total number of interfaces that are down, number of attacks, CPU spikes, system reboots, and sessions. This data is refreshed automatically based on the selected time range.
At the bottom of the page is an area view of different events that are happening at a specific time. The events include firewall, Web filtering, VPN, content filtering, antispam, antivirus, screen, IPS, and IPsec VPN. Each event is color‐coded, with darker shades representing a higher level of activity. Each tab provides deep information like type, and number of events occurring at that specific time.
Table 1 describes the widgets on the All Events Summary View page.
Field |
Description |
---|---|
Total Events |
View the total number of events that includes firewall, web filtering, IPS, IPsec VPNs, content filtering, antispam, antivirus, and screen. |
Firewall |
View the total number of events blocked by the firewall. |
Web Filtering |
View the total number of URLs permitted and blocked. |
Screen |
View the total number of blocked screen events. |
IPS |
View the data seen by the IDP engine and categorized as Critical, High, Medium. |
Content Filtering |
View the details of the blocked traffic. |
Antispam |
View the details of the blocked traffic. |
Antivirus |
View the details of the blocked traffic. |
Detail View
Click Detail View for comprehensive details of events in a tabular format that includes sortable columns. You can sort the events using the Group By option. For example, you can sort the events based on threat severity. The table includes information such as the rule that caused the event, severity for the event, event ID, traffic information, and how and when the event was detected.
Table 2 describes the fields on the All Events Detail View Page.
Fields |
Description |
---|---|
Time |
View the time when the traffic log was generated. |
Generated By |
|
Traffic Session ID |
View the Session ID mapped by site to an event. |
User Name |
View the user name. |
Source IP |
View the source IP address from where the event occurred (IPv4 or IPv6). |
Destination IP |
View the destination IP address of the event (IPv4 or IPv6). |
Application |
Name of the application associated with the traffic that triggered the event. |
Nested Application |
View the name of the Layer 7 application. |
Threat Severity |
View the threat severity of the event. |
URL |
View the accessed URL name that triggered the traffic log. You can only recategorize the Juniper NextGen URL categories. To recategorize the URL, right-click on the URL or click More and select Request URL Categorization. The Request URL Categorization page opens. For more information on the URL recategorization, see Request URL Recategorization. |
Name |
View the name of the event. |
Received Time |
View the time when the traffic log was received by Juniper Security Director Cloud. |
Policy Name |
View the policy name in the log. |
Event Name |
View the event name of the traffic log. |
Source Country |
View the source country name from where the event originated. |
Destination Country |
View the destination country name from where the event occurred. |
Source Port |
View the source port of the event. |
Destination Port |
View the destination port of the event. |
Description |
View the description of the log. |
Attack Name |
View the attack name of the log: Trojan, worm, virus, and so on. |
Category |
View the event category of the traffic log (For example firewall or apptrack). |
Client Hostname |
Host name of the client associated with the traffic that triggered the event. For example, if a specific computer is infected, the name of that computer is displayed. |
Event Category |
View the event category of the traffic log (For example firewall or apptrack). |
Argument |
View the type of traffic. For example, FTP and HTTP. |
Action |
View the action taken for the event: warning, allow, and block. |
Service Name |
View the name of the Layer 4 service used for the traffic that triggered the event. For example, FTP, HTTP, SSH, and so on. |
Source Zone |
View the source zone of the site. |
Destination zone |
View the destination zone of the site. |
Protocol ID |
Protocol ID of the traffic that triggered the event. |
Roles |
View the role names associated with the event. |
Reason |
View the reason for the log generation. For example, unrestricted access. |
NAT Source Port |
View the source port of traffic after NAT. |
NAT Destination Port |
View the destination port of traffic after NAT. |
NAT Source Rule Name |
View the source NAT rule name. |
NAT Destination Rule Name |
View the destination NAT rule name. |
NAT Source IP |
View the source IP address after the IP address translation. |
NAT Destination IP |
View the destination IP address after the IP address translation. |
Path Name |
View the path name of the log. |
Logical System Name |
View the logical system name. |
Rule Name |
View the rule name. |
Profile Name |
View the name of the event profile that triggered the log. |
Malware Info |
Information about the malware causing the event. |
Source VRF Group Name |
View the source VRF group name that generated the event. |
Destination VRF Group Name |
View the destination VRF group name that generated the event. |