ON THIS PAGE
About the All Security Events Page
To access this page, click Monitor > Logs > All Security Events.
Use this page to get an overall, high‐level view of your network environment. You can view abnormal events, attacks, viruses, or worms when log data is correlated and analyzed.
The following examples indicate the types of logs that the All Security Events page displays:
-
AV_VIRUS_DETECETED
-
IDP_ATTACK_LOG_EVENT
-
CONTENET_FILETER_BLOCKED
-
ANTISPAM_SPAM_DETECTED_MTSECINTEL_ACTION_LOG
-
AAMW_ACTION_LOG
-
SMS_MALICIOUS_VERDICT
-
RT_FLOW_SESSION_DENY
-
TUN-STATUS-ALERT
-
SECINTEL_ACTION_LOG
-
AAMW_SMS_STREAMING_LOG
-
ANTI_VIRUS_ACTION_LOG
This page provides administrators with an advanced filtering mechanism and visibility into actual events collected by the Log Collector. Using the time-range slider, you can focus on the area of activity that interests you the most. Once the time range is selected, all the data presented in your view is refreshed automatically. You can also use the custom button to set a custom time range.
There are two ways to view your data. You can select either the Summary View tab or the Detail View tab.
This information is sourced from the system syslog for the VPN events, and IPS, Content Security, firewall deny logs when logging is enabled on policies for all other events.
Tasks You Can Perform
You can perform the following tasks from this page:
-
View a brief summary of all events in your network. See Summary View.
-
View the comprehensive details of events in a tabular format that includes sortable columns. See Detail View.
Summary View
You can view a brief summary of all the events in your network. At the center of the page is critical information, including total number of events, viruses found, total number of interfaces that are not working, number of attacks, CPU spikes, system reboots, and sessions. This data is refreshed automatically based on the selected time range.
At the bottom of the page is an area view of different events that are happening at a specific time. The events include firewall, Web filtering, VPN, content filtering, antispam, antivirus, screen, IPS, and IPsec VPN. Each event is color‐coded, with darker shades representing a higher level of activity. Each tab provides deep information like type, and number of events occurring at that specific time.
Table 1 describes the widgets on the All Events Summary View page.
Field |
Description |
---|---|
Total Events |
View the total number of events that includes firewall, web filtering, IPS, IPsec VPNs, content filtering, antispam, antivirus, and screen events. |
Firewall |
View the total number of events blocked by the firewall. |
Web Filtering |
View the total number of URLs permitted and blocked. |
Screen |
View the total number of blocked screen events. |
IPS |
View the data seen by the IDP engine and categorized as Critical, High, Medium. |
Content Filtering |
View the details of the blocked traffic. |
Antispam |
View the details of the blocked traffic. |
Antivirus |
View the details of the blocked traffic. |
Detail View
You can sort the events using the Group By option. For example, you can sort the events that are based on threat severity. The table includes information such as the rule that caused the event, severity for the event, event ID, traffic information, and how and when the event was detected.
Table 2 describes the fields on the All Events Detail View Page.
Fields |
Description |
---|---|
Time |
View the time when the traffic log was generated. |
Generated By |
View the name of the user who generated the log. |
Traffic Session ID |
View the session ID mapped by site to an event. |
User Name |
View the username. |
Source IP |
View the source IP address (IPv4 or IPv6) from where the event occurred. |
Destination IP |
View the destination IP address (IPv4 or IPv6) of the event. |
Application |
View the name of the application associated with the traffic that triggered the event. |
Nested Application |
View the name of the Layer 7 application. |
Threat Severity |
View the threat severity of the event. |
URL |
View the accessed URL name that triggered the traffic log. You can only recategorize the Juniper NextGen URL categories. To recategorize the URL, click More and select Request URL Categorization. The Request URL Categorization page opens. For more information on URL recategorization, see Request URL Recategorization. |
Name |
View the name of the event. |
Received Time |
View the time when the traffic log was received by Juniper Security Director Cloud. |
Policy Name |
View the policy name in the log. |
Event Name |
View the event name of the traffic log. |
Source Country |
View the source country name from where the event originated. |
Destination Country |
View the destination country name from where the event occurred. |
Source Port |
View the source port of the event. |
Destination Port |
View the destination port of the event. |
Description |
View the description of the log. |
Attack Name |
View the attack name of the log, such as Trojan, worm, and virus. |
Category |
View the event category of the traffic log—firewall or APPTRACK. |
Client Hostname |
The hostname of the client associated with the traffic that triggered the event. For example, if a specific computer is infected, the name of that computer is displayed. |
Event Category |
View the event category of the traffic log—firewall or APPTRACK. |
Argument |
View the type of traffic—FTP and HTTP. |
Action |
View the action taken for the event—warning, allow, and block. |
Service Name |
View the name of the Layer 4 service used for the traffic that triggered the event, such as FTP, HTTP, and SSH. |
Source Zone |
View the source zone of the site. |
Destination zone |
View the destination zone of the site. |
Protocol ID |
View the protocol ID of the traffic that triggered the event. |
Roles |
View the role names associated with the event. |
Reason |
View the reason for the log generation, such as unrestricted access. |
NAT Source Port |
View the source port of traffic after NAT. |
NAT Destination Port |
View the destination port of traffic after NAT. |
NAT Source Rule Name |
View the source NAT rule name. |
NAT Destination Rule Name |
View the destination NAT rule name. |
NAT Source IP |
View the source IP address after the IP address translation. |
NAT Destination IP |
View the destination IP address after the IP address translation. |
Path Name |
View the pathname of the log. |
Logical System Name |
View the logical system name. |
Rule Name |
View the rule name. |
Profile Name |
View the name of the event profile that triggered the log. |
Malware Info |
View information about the malware causing the event. |
Source VRF Group Name |
View the source VRF group name that generated the event. |
Destination VRF Group Name |
View the destination VRF group name that generated the event. |
Filename |
View the name of the file flagged for viruses. |
File Category |
View the file type that was flagged for viruses, such as a PDF, a Word document, or an executable file. |
Verdict Number |
View the configured verdict threshold number of the file detected as a virus. |
Virus Info |
View the total number of virus signature hits. |
Virus db Version |
View the signature database version. |