Take your networking performance to new heights with a modern, cloud-native, AI-Native architecture. Only Juniper can help you unleash the full potential of Wi-Fi 7 with our AI-Native platform for innovation.
Juniper’s AI data center solution is a quick way to deploy high performing AI training and inference networks that are the most flexible to design and easiest to manage with limited IT resources.
Juniper's Ai-Native routing solution delivers robust 400GbE and 800GbE capabilities for unmatched performance, reliability, and sustainability at scale.
Juniper's Ai-Native routing solution delivers robust 400GbE and 800GbE capabilities for unmatched performance, reliability, and sustainability at scale.
Shaping Student Experiences: The NOW Way to Build Higher Education Networks
Juniper Networks CIO Sharon Mandell and a virtual summit of C-level IT leaders from prestigious institutions discuss ongoing efforts to support digital transformation on campus.
Retail experts Kevin McCartan, Senior IT Service Delivery Engineer at Musgrave; Jack Stratten of Insider Trends; and Christian Gilby, Senior Director of Product Marketing at Juniper Networks, discuss customer experiences.
Legacy networks simply cannot meet the demands of today’s rapidly evolving metro landscape. Unlock a new generation of highly scalable architectures and automated operations with the Juniper ACX7020.
Lack of AI innovation from your current networking vendor slowing you down? Embrace Juniper’s cloud-native, AI-Native access switches that support every level and layer, across nearly every deployment.
Delivering practical solutions and enriching discussions, this podcast series is a vital resource for those seeking an in-depth exploration of AI's transformative potential.
Juniper AI Care Services Revolutionize Your Service Experience
Our industry-first AI-Native services couple AIOps with our deep expertise across the full network life cycle. You can move from reactive response to proactive insight and action.
Juniper AI Data Center Deployment Services Optimize Your AI Model Runs
We use our expertise and validated designs to help design, deploy, validate and tune networks, including GPUs and storage, to get the most from your AI infrastructure operation.
Dive deep with leading experts and thought leaders on all the topics that matter most to your business, from AI to network security to driving rapid, relevant transformation for your business.
You can configure PDF threat assessment reports to be run on-demand or on scheduled intervals.
While you cannot determine the information included in the report, you can narrow
information to a selected time frame.
The generated report will contain categories such as the following:
Table 1: PDF Report Contents
Report Category
Definition
Executive Summary
An overview report data separated into following categories:
Malware—Lists newly discovered malware and known
malware.
C&C Server Destinations—Lists C&C server
destination.
Note:
The criterion to display the C&C server destination in the reports is that the threat level
must be equal to or greater than 7.
Hosts with Malicious Activities—Lists the following:
Infected hosts—Lists the number of potentially infected
hosts whose threat level is less than the threshold threat level that
is set by the customer.
Blocked hosts—Lists the number of infected hosts that have met the threshold threat level and is
blocked by policies configured on the SRX Series
Firewall.
Domains and URLs—Lists the suspicious or risky domains and URLs
High-risk User Data—Lists the following:
Users’ computers infected with malware.
High-risk websites accessed by users.
DNS DGA—Lists the DNS-DGA query counts for the top host IP
addresses.
DNS Tunnels—Lists the DNS tunnel counts for the top host IP
addresses.
ETI Source Hosts—Lists the ETI detection counts for the top
host IP addresses.
ETI Destinations—Lists the ETI detection counts for the top
Server Name Indication (SNI) domains.
Malware
The malware section contains the following information:
Top Malware Identified—Lists the names of the top
malware by count.
Top Infected File MIME Types—Lists the top infected
multi-purpose Internet mail extensions (MIME) by count.
Top Scanned File Categories—Lists the top file categories
that are scanned.
C&C Server and Malware Locations
This section contains the following information:
Top C&C Server Location by Count—Lists the top
countries for command and control (C&C) servers by number of communication
attempts (C&C hits).
Top Malware Threat Locations by Count—Lists the
top countries with malware threats.
ETI Server Locations
This section contains the following
information:
Top ETI Server Locations by Count—Lists the top countries for
ETI servers by number of communication attempts (ETI
hits).
DNS
This section contains the following information:
DNS Event Counts—Lists the following:
DNS-DGA Events—Lists the number of DGA events seen
by ATP Cloud for the customer over the time period
that the report covers.
DNS Tunnel Events—Lists the number of Tunnel events
seen by ATP Cloud for the customer over the time
period that the report covers.
Top DNS Tunnel Destination Domains—Lists the top tunnel
domains seen by ATP Cloud and number of events involving
those domains for the customer over the time period that the
report covers.
Hosts
This section contains the following information:
Top Compromised Hosts—Lists the top hosts that might have been compromised based on their
associated threat level.
Risky Files
This section contains the following information:
Top Risky File Categories by Count—Lists the top
risky file categories by count for known and newly discovered malicious
files.
Top Risky Files Detected by Count—Lists the top
risky files detected by count.
Top IPs Detected Attempting to Access Risky Files by Count—Lists
the top IP addresses attempting to access risky files.
Top Risky Files Detected per Top Users—Lists the top risky
files detected per top users attempting to access the files.
Risky Domains, URLS, AND IPs
This section contains the following information: top
risky domains, URLs, and IP addresses detected by the number of times
access was attempted. It also includes the top users who have attempted
to access these risky domains, URLs, and IP addresses.
Top Detected Risky Domains, URLs, and IPs by Count—Lists
the top risky domains, URLs, and IP addressess detected by the number
of times access was attempted.
Most Active Users for Risky Domains, URLs, and IPs by
Count—Lists the top users who are most active in attempting
to access the risky domains, URLs, and IP addresses by count.
Top Detected Risky Domains, URLs, and IPs by Threat Level—Lists
the top risky domains, URLs, and IP addressess detected by the threat
level.
Email
This section contains the list of actions taken on scanned
emails. It also includes email attachments determined to be malware
and users who are risky email senders.
Actions Taken—Lists the action taken for scanned
e-mail.
High-Risk Email Data—Lists the count of e-mail attachments
with malware and risky senders.
Malicious SMTP Email by Count—The report breaks
scanned e-mail down by protocol and lists SMTP e-mails found to be
malicious.
Malicious IMAP Email by Count—The report breaks
scanned e-mail down by protocol and lists IMAP e-mails found to be
malicious.
Top Risky File Categories Detected for Email Attachments—Lists
the top risky file categories that were detected from files received
as e-mail attachments.
Top Risky Email Attachments Detected by Count—Lists
the top risky files that are detected from email attachments.
Top Users Receiving Risky Email Attachments—Lists
the top users who are receiving risky file attachments through e-mail.
Top Risky Email Attachments Detected per Top Users—Lists
the top users and their most risky file attachments.
Top Risky Email Sender Domains by Count—Lists the
top risky sender domains based on the threat level of file attachments
sent in email.
Top Sender Domains of Risky File Attachments by Count—Lists
the top sender domains with risky file attachments and the count of
how many times the the risky file attachments that were detected.
Actions on SMTP Malicious Email by Count—Lists actions
taken for malicious SMTP e-mails.
Actions on IMAP Malicious Email by Count—Lists actions
taken for malicious IMAP e-mails.
Devices
This section contains the following
information:
Zero Submissions—Lists the devices that have not submitted
files in the past 30 days.
Expiring Devices—Lists the devices that are going to expire
in next 60 days.