Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Using Reports

Reports are generated based on a summary of network activity and overall network status. These generated reports can help you to perform a trend analysis of your network's activities to study changes in traffic patterns.

Using reports, you can:

  • Schedule reports based on the defined filters.

  • Schedule reports based on the available default reports.

A Juniper Networks branded cover page is the default cover sheet reports. It contains the report title, name, and date of report creation. You can provide your company logo on the cover page along with the Juniper Networks logo. You can also provide the text for the footer and the logo for the header. If you do not provide the header and footer, the Juniper Networks branded header and footer are used. The generated report includes Table of Contents (TOC) with links to each section of the report. When the system generates a report, you and other designated recipients receive the report in PDF format through e‐mail.


Logs, also called event logs, provide vital information for managing network security incident investigation and response. Logging provides the following features:

  • Receives events from SRX Series Firewalls and application logs.

  • Stores events for a defined period of time or a set volume of data.

  • Parses and indexes logs to help speed up searching.

  • Provides queries and helps in data analysis and historical events investigation.