Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

About the All Security Events Page

To access this page, click Monitor > Logs > All Security Events.

Use this page to get an overall, high‐level view of your network environment. You can view abnormal events, attacks, viruses, or worms when log data is correlated and analyzed.

The following examples indicate the types of logs that the All Security Events page displays:

  • AV_VIRUS_DETECETED

  • IDP_ATTACK_LOG_EVENT

  • CONTENET_FILETER_BLOCKED

  • ANTISPAM_SPAM_DETECTED_MTSECINTEL_ACTION_LOG

  • AAMW_ACTION_LOG

  • SMS_MALICIOUS_VERDICT

  • RT_FLOW_SESSION_DENY

  • TUN-STATUS-ALERT

  • SECINTEL_ACTION_LOG

  • AAMW_SMS_STREAMING_LOG

  • ANTI_VIRUS_ACTION_LOG

This page provides administrators with an advanced filtering mechanism and visibility into actual events collected by the Log Collector. Using the time-range slider, you can focus on the area of activity that interests you the most. Once the time range is selected, all the data presented in your view is refreshed automatically. You can also use the custom button to set a custom time range.

There are two ways to view your data. You can select either the Summary View tab or the Detail View tab.

Note:

This information is sourced from the system syslog for the VPN events, and IPS, Content Security, firewall deny logs when logging is enabled on policies for all other events.

Tasks You Can Perform

You can perform the following tasks from this page:

  • View a brief summary of all events in your network. See Summary View.

  • View the comprehensive details of events in a tabular format that includes sortable columns. See Detail View.

Summary View

You can view a brief summary of all the events in your network. At the center of the page is critical information, including total number of events, viruses found, total number of interfaces that are not working, number of attacks, CPU spikes, system reboots, and sessions. This data is refreshed automatically based on the selected time range.

At the bottom of the page is an area view of different events that are happening at a specific time. The events include firewall, Web filtering, VPN, content filtering, antispam, antivirus, screen, IPS, and IPsec VPN. Each event is color‐coded, with darker shades representing a higher level of activity. Each tab provides deep information like type, and number of events occurring at that specific time.

Table 1 describes the widgets on the All Events Summary View page.

Table 1: Widgets on the All Security Events Summary View Page

Field

Description

Total Events

View the total number of events that includes firewall, web filtering, IPS, IPsec VPNs, content filtering, antispam, antivirus, and screen events.

Firewall

View the total number of events blocked by the firewall.

Web Filtering

View the total number of URLs permitted and blocked.

Screen

View the total number of blocked screen events.

IPS

View the data seen by the IDP engine and categorized as Critical, High, Medium.

Content Filtering

View the details of the blocked traffic.

Antispam

View the details of the blocked traffic.

Antivirus

View the details of the blocked traffic.

Detail View

You can sort the events using the Group By option. For example, you can sort the events that are based on threat severity. The table includes information such as the rule that caused the event, severity for the event, event ID, traffic information, and how and when the event was detected.

Table 2 describes the fields on the All Events Detail View Page.

Table 2: Fields on the All Events Detail View Page

Fields

Description

Time

View the time when the traffic log was generated.

Generated By

View the name of the user who generated the log.

Traffic Session ID

View the session ID mapped by site to an event.

User Name

View the username.

Source IP

View the source IP address (IPv4 or IPv6) from where the event occurred.

Destination IP

View the destination IP address (IPv4 or IPv6) of the event.

Application

View the name of the application associated with the traffic that triggered the event.

Nested Application

View the name of the Layer 7 application.

Threat Severity

View the threat severity of the event.

URL

View the accessed URL name that triggered the traffic log.

You can only recategorize the Juniper NextGen URL categories. To recategorize the URL, click More and select Request URL Categorization. The Request URL Categorization page opens.

For more information on URL recategorization, see Request URL Recategorization.

Name

View the name of the event.

Received Time

View the time when the traffic log was received by Juniper Security Director Cloud.

Policy Name

View the policy name in the log.

Event Name

View the event name of the traffic log.

Source Country

View the source country name from where the event originated.

Destination Country

View the destination country name from where the event occurred.

Source Port

View the source port of the event.

Destination Port

View the destination port of the event.

Description

View the description of the log.

Attack Name

View the attack name of the log, such as Trojan, worm, and virus.

Category

View the event category of the traffic log—firewall or APPTRACK.

Client Hostname

The hostname of the client associated with the traffic that triggered the event. For example, if a specific computer is infected, the name of that computer is displayed.

Event Category

View the event category of the traffic log—firewall or APPTRACK.

Argument

View the type of traffic—FTP and HTTP.

Action

View the action taken for the event—warning, allow, and block.

Service Name

View the name of the Layer 4 service used for the traffic that triggered the event, such as FTP, HTTP, and SSH.

Source Zone

View the source zone of the site.

Destination zone

View the destination zone of the site.

Protocol ID

View the protocol ID of the traffic that triggered the event.

Roles

View the role names associated with the event.

Reason

View the reason for the log generation, such as unrestricted access.

NAT Source Port

View the source port of traffic after NAT.

NAT Destination Port

View the destination port of traffic after NAT.

NAT Source Rule Name

View the source NAT rule name.

NAT Destination Rule Name

View the destination NAT rule name.

NAT Source IP

View the source IP address after the IP address translation.

NAT Destination IP

View the destination IP address after the IP address translation.

Path Name

View the pathname of the log.

Logical System Name

View the logical system name.

Rule Name

View the rule name.

Profile Name

View the name of the event profile that triggered the log.

Malware Info

View information about the malware causing the event.

Source VRF Group Name

View the source VRF group name that generated the event.

Destination VRF Group Name

View the destination VRF group name that generated the event.

Filename

View the name of the file flagged for viruses.

File Category

View the file type that was flagged for viruses, such as a PDF, a Word document, or an executable file.

Verdict Number

View the configured verdict threshold number of the file detected as a virus.

Virus Info

View the total number of virus signature hits.

Virus db Version

View the signature database version.