- play_arrow What's New for Administrators
- play_arrow Overview of JSA Administration
- play_arrow User Management
- play_arrow License Management
- play_arrow System Management
- System Management
- System Health Information
- JSA Component Types
- Data Nodes
- Network Interface Management
- JSA System Time
- NAT-Enabled Networks
- Off-site Hosts Management
- Managed Hosts
- Configuration Changes in your JSA Environment
- Deploying Changes
- Restarting the Event Collection Service
- Shutting Down a System
- Restarting a System
- Collecting Log Files
- Changing the Root Password on Your JSA Console
- Resetting SIM
- play_arrow JSA Set Up Tasks
- JSA Set Up Tasks
- Network Hierarchy
- Automatic Updates
- Manual Updates
- Configuring System settings
- IF-MAP Server Certificates
- SSL Certificates
- IPv6 Addressing in JSA Deployments
- Advanced Iptables Rules Examples
- Data Retention
- System Notifications
- Custom Offense Close Reasons
- Configuring a Custom Asset Property
- Index Management
- Restrictions to Prevent Resource-intensive Searches
- App Hosts
- Checking the Integrity Of Event and Flow Logs
- Adding Custom Actions
- Managing Aggregated Data Views
- Accessing a GLOBALVIEW Database
- play_arrow Event Data Processing in JSA
- Event Data Processing in JSA
- DSM Editor Overview
- Properties in the DSM Editor
- Property Configuration in the DSM Editor
- Opening the DSM Editor
- Configuring a Log Source Type
- Configuring Property Autodetection for Log Source Types
- Configuring Log Source Autodetection for Log Source Types
- Configuring DSM Parameters for Log Source Types
- Custom Log Source Types
- Custom Property Definitions in the DSM Editor
- Event Mapping
- Exporting Contents from the DSM Editor
- play_arrow Using Reference Data in JSA
- play_arrow User Information Source Configuration
- play_arrow Juniper Networks X-Force Integration
- play_arrow Managing Authorized Services
- play_arrow Backup and Recovery
- play_arrow Flow Sources Management
- play_arrow Remote Networks and Services Configuration
- play_arrow Server Discovery
- play_arrow Domain Segmentation
- play_arrow Multitenant Management
- Multitenant Management
- User Roles in a Multitenant Environment
- Domains and Log Sources in Multitenant Environments
- Provisioning a New Tenant
- Monitoring License Usage in Multitenant Deployments
- Rules Management in Multitenant Deployments
- Network Hierarchy Updates in a Multitenant Deployment
- Retention Policies for Tenants
- play_arrow Asset Management
- play_arrow Configuring JSA to Forward Data to Other Systems
- Forward Data to Other Systems
- Adding Forwarding Destinations
- Configuring Forwarding Profiles
- Configuring Routing Rules to Forward Data
- Using Custom Rules and Rule Responses to Forward Data
- Configuring Routing Rules to Use the JSA Data Store
- Viewing Forwarding Destinations
- Viewing and Managing Forwarding Destinations
- Viewing and Managing Routing Rules
- play_arrow Event Store and Forward
- play_arrow Security Content
- play_arrow SNMP Trap Configuration
- play_arrow Protect Sensitive Data
- play_arrow Log Files
- play_arrow Common Ports and Servers Used by JSA
- play_arrow RESTful API
Potential Exploit
The potential exploit category contains events that are related to potential application exploits and buffer overflow attempts.
The following table describes the low-level event categories and associated severity levels for the potential exploit category.
Low-level event category | Category ID | Description | Severity level (0 - 10) |
---|---|---|---|
Unknown Potential Exploit Attack | 13001 | Indicates that a potential exploitative attack was detected. | 7 |
Potential Buffer Overflow | 13002 | Indicates that a potential buffer overflow was detected. | 7 |
Potential DNS Exploit | 13003 | Indicates that a potentially exploitative attack through the DNS server was detected. | 7 |
Potential Telnet Exploit | 13004 | Indicates that a potentially exploitative attack through Telnet was detected. | 7 |
Potential Linux Exploit | 13005 | Indicates that a potentially exploitative attack through Linux was detected. | 7 |
Potential UNIX Exploit | 13006 | Indicates that a potentially exploitative attack through UNIX was detected. | 7 |
Potential Windows Exploit | 13007 | Indicates that a potentially exploitative attack through Windows was detected. | 7 |
Potential Mail Exploit | 13008 | Indicates that a potentially exploitative attack through mail was detected. | 7 |
Potential Infrastructure Exploit | 13009 | Indicates that a potential exploitative attack on the system infrastructure was detected. | 7 |
Potential Misc Exploit | 13010 | Indicates that a potentially exploitative attack was detected. | 7 |
Potential Web Exploit | 13011 | Indicates that a potentially exploitative attack through the web was detected. | 7 |
Potential Botnet Connection | 13012 | Indicates a potentially exploitative attack that uses botnet was detected. | 6 |
Potential Worm Activity | 13013 | Indicates a potential attack that uses worm activity was detected. | 6 |