Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Dashboard Overview

The Juniper Advanced Threat Prevention Cloud Web UI is a Web-based service portal that lets you monitor malware downloaded through your SRX Series Firewalls.

The Web UI for Juniper ATP Cloud includes a dashboard that provides a summary of all gathered information on compromised content and hosts. Drag and drop widgets to add them to your dashboard. Mouse over a widget to refresh, remove, or edit the contents.

Note:

The data on the Web UI dashboard is updated on hourly checks; it does not get updated in real-time.

In addition, you can use the dashboard to:

  • Navigate to the Files page from the Top Scanned Files and Top Infected Files widgets by clicking the More Details link.

  • Navigate to the Hosts page from the Top Compromised Hosts widget by clicking the More Details link.

  • Navigate to the Command and Control Servers page from the Threat Source widget.

Available dashboard widgets are as follows:

Table 1: Juniper ATP Cloud Dashboard Widgets

Widget

Definition

Top Malware Identified

A list of the top malware found based on the number of times the malware is detected over a period of time. Use the arrow to filter by different time frames.

Top Compromised Hosts

A list of the top compromised hosts based on their associated threat level and blocked status.

Top Infected File Types

A graph of the top infected file types by file extension. Examples: exe, pdf, ini, zip. Use the arrows to filter by threat level and time frame.

Top Infected File Categories

A graph of the top infected file categories. Examples: executables, archived files, libraries. Use the arrows to filter by threat level and time frame.

Top Scanned File Types

A graph of the top file types scanned for malware. Examples: exe, pdf, ini, zip. Use the arrows to filter by different time frames.

Top Scanned File Categories

A graph of the top file categories scanned for malware. Examples: executables, archived files, libraries. Use the arrows to filter by different time frames.

C&C Server and Malware Source

A color-coded map displaying the location of Command and Control servers or other malware sources. Click a location on the map to view the number of detected sources.