- play_arrow What's New for Administrators
- play_arrow Overview of JSA Administration
- play_arrow User Management
- play_arrow License Management
- play_arrow System Management
- System Management
- System Health Information
- JSA Component Types
- Data Nodes
- Network Interface Management
- JSA System Time
- NAT-Enabled Networks
- Off-site Hosts Management
- Managed Hosts
- Configuration Changes in your JSA Environment
- Deploying Changes
- Restarting the Event Collection Service
- Shutting Down a System
- Restarting a System
- Collecting Log Files
- Changing the Root Password on Your JSA Console
- Resetting SIM
- play_arrow JSA Set Up Tasks
- JSA Set Up Tasks
- Network Hierarchy
- Automatic Updates
- Manual Updates
- Configuring System settings
- IF-MAP Server Certificates
- SSL Certificates
- IPv6 Addressing in JSA Deployments
- Advanced Iptables Rules Examples
- Data Retention
- System Notifications
- Custom Offense Close Reasons
- Configuring a Custom Asset Property
- Index Management
- Restrictions to Prevent Resource-intensive Searches
- App Hosts
- Checking the Integrity Of Event and Flow Logs
- Adding Custom Actions
- Managing Aggregated Data Views
- Accessing a GLOBALVIEW Database
- play_arrow Event Data Processing in JSA
- Event Data Processing in JSA
- DSM Editor Overview
- Properties in the DSM Editor
- Property Configuration in the DSM Editor
- Opening the DSM Editor
- Configuring a Log Source Type
- Configuring Property Autodetection for Log Source Types
- Configuring Log Source Autodetection for Log Source Types
- Configuring DSM Parameters for Log Source Types
- Custom Log Source Types
- Custom Property Definitions in the DSM Editor
- Event Mapping
- Exporting Contents from the DSM Editor
- play_arrow Using Reference Data in JSA
- play_arrow User Information Source Configuration
- play_arrow Juniper Networks X-Force Integration
- play_arrow Managing Authorized Services
- play_arrow Backup and Recovery
- play_arrow Flow Sources Management
- play_arrow Remote Networks and Services Configuration
- play_arrow Server Discovery
- play_arrow Domain Segmentation
- play_arrow Multitenant Management
- Multitenant Management
- User Roles in a Multitenant Environment
- Domains and Log Sources in Multitenant Environments
- Provisioning a New Tenant
- Monitoring License Usage in Multitenant Deployments
- Rules Management in Multitenant Deployments
- Network Hierarchy Updates in a Multitenant Deployment
- Retention Policies for Tenants
- play_arrow Asset Management
- play_arrow Configuring JSA to Forward Data to Other Systems
- Forward Data to Other Systems
- Adding Forwarding Destinations
- Configuring Forwarding Profiles
- Configuring Routing Rules to Forward Data
- Using Custom Rules and Rule Responses to Forward Data
- Configuring Routing Rules to Use the JSA Data Store
- Viewing Forwarding Destinations
- Viewing and Managing Forwarding Destinations
- Viewing and Managing Routing Rules
- play_arrow Event Store and Forward
- play_arrow Security Content
- play_arrow SNMP Trap Configuration
- play_arrow Protect Sensitive Data
- play_arrow Log Files
- play_arrow Common Ports and Servers Used by JSA
- play_arrow RESTful API
Risk
The risk category contains events that are related to JSA Risk Manager.
The following table describes the low-level event categories and associated severity levels for the risk category.
Low-level event category | Category ID | Description | Severity level (0 - 10) |
---|---|---|---|
Policy Exposure | 20001 | Indicates that a policy exposure was detected. | 5 |
Compliance Violation | 20002 | Indicates that a compliance violation was detected. | 5 |
Exposed Vulnerability | 20003 | Indicates that the network or device has an exposed vulnerability. | 9 |
Remote Access Vulnerability | 20004 | Indicates that the network or device has a remote access vulnerability. | 9 |
Local Access Vulnerability | 20005 | Indicates that the network or device has local access vulnerability. | 7 |
Open Wireless Access | 20006 | Indicates that the network or device has open wireless access. | 5 |
Weak Encryption | 20007 | Indicates that the host or device has weak encryption. | 5 |
Un-Encrypted Data Transfer | 20008 | Indicates that a host or device is transmitting data that is not encrypted. | 3 |
Un-Encrypted Data Store | 20009 | Indicates that the data store is not encrypted. | 3 |
Mis-Configured Rule | 20010 | Indicates that a rule is not configured properly. | 3 |
Mis-Configured Device | 20011 | Indicates that a device on the network is not configured properly. | 3 |
Mis-Configured Host | 20012 | Indicates that a network host is not configured properly. | 3 |
Data Loss Possible | 20013 | Indicates that the possibility of data loss was detected. | 5 |
Weak Authentication | 20014 | Indicates that a host or device is susceptible to fraud. | 5 |
No Password | 20015 | Indicates that no password exists. | 7 |
Fraud | 20016 | Indicates that a host or device is susceptible to fraud. | 7 |
Possible DoS Target | 20017 | Indicates a host or device is a possible DoS target. | 3 |
Possible DoS Weakness | 20018 | Indicates a host or device has a possible DoS weakness. | 3 |
Loss of Confidentiality | 20019 | Indicates that a loss of confidentially was detected. | 5 |
Policy Monitor Risk Score Accumulation | 20020 | Indicates that a policy monitor risk score accumulation was detected. | 1 |