- play_arrow JSA Risk Manager
- play_arrow JSA Risk Manager configuration
- play_arrow Network Device Management
- play_arrow Network Device Management
- Device Discovery Process
- Discovering Devices in your Network
- Importing Multiple Devices from a CSV File
- Adding a Network Device to JSA Risk Manager
- Deleting a Device from JSA Risk Manager
- Finding Network Devices in the Device List
- Adding Device Information to the Topology
- Collecting Neighbor Data to Update the Topology
- Configuring the Discovery Schedule to Populate Device Information
- play_arrow Device Configuration Backup Jobs
- play_arrow Network Connections Overview
- play_arrow Network Connections Overview
- play_arrow Network Device Configuration and Monitoring
- play_arrow Network Device Configuration and Monitoring
- Searching Device Rules
- Filtering Device Rules by User or Group
- Comparing the Configuration of your Network Devices
- Adding or Deleting a Device in JSA Risk Manager
- Backing up a Device to get its Configuration Data
- Discovering Devices in your Network
- play_arrow Log Source Mapping in JSA
- play_arrow Protocol Configuration for Network Devices
- play_arrow Schedules for Discovery and Backup
- play_arrow Firewall Rule Event Counts of Check Point Devices
- play_arrow Network Topology
- play_arrow Network Topology
- play_arrow CIS Benchmark Scans
- play_arrow Network Simulations in JSA Risk Manager
- play_arrow Network Simulations in JSA Risk Manager
- Simulation Tests
- Creating a Simulation
- Duplicating a Simulation
- Manually Running a Simulation
- play_arrow Network Configuration Change Simulation
- Simulating an Attack on an SSH Protocol
- Viewing Simulation Results
- Approving Simulation Results
- Revoking a Simulation Approval
- Assigning Simulations to Group for Tracking
- play_arrow Topology models
- play_arrow Reports
- play_arrow Audit Log Data
Device and Rule Question Results
SUMMARY Device and rule results display after you submit a Policy Monitor question. The Risk Score displayed indicates the level of risk that is associated with the question.
The Risk Score calculation is based on the importance factor that is assigned to the question, and the number of results returned for the question.
The following table describes the parameters for devices and rules results.
Parameter | Description |
---|---|
Device IP | The IP address of the device. |
Device Name | The name of the device, as obtained from the configuration monitor. |
Device Type | The type of device, as obtained from the asset profile. For more information about asset profiles, see the Juniper Secure Analytics Users Guide. |
List | The name of the rule from the device. |
Entry | The entry number of the rule. |
Action | The action associated with the relevant rule from the device. The options are permit, deny, or NA. |
Source(s) | The source network associated with this asset. Sources with a hyperlink indicate an object group reference. Click the link to view detailed information about one or more object group references. |
Source Service(s) | The source ports and the comparison that is associated with the relevant rule from the device are shown in the following format: <comparison>:<port> Where <comparison>might include one of the following options: eq - Equal ne - Not equal lt - Less than gt - Greater than For example, if the parameter indicates ne:80, any port other than 80 applies this source service. If the parameter indicates lt:80, the range of applicable ports is 0 - 79. This parameter displays the source port for the device rule. If no port exists for this device rule, the term NA is displayed. Source services with a hyperlink indicate an object group reference. Click the link to view detailed information about one or more object group references. |
Destination(s) | The destination network associated with the relevant rule from the device. Destinations with a hyperlink indicate an object group reference. Click the link to view detailed information about one or more object group references. |
Destination Service(s) | The destination ports and the comparison that is associated with the relevant rule from the device is displayed in the following format: <comparison>:<port> Where <comparison>might include one of the following options: eq - Equal ne - Not equal lt - Less than gt - Greater than For example, if the parameter indicates ne:80, any port other than 80 applies to this destination service. If the parameter indicates lt:80, the range of applicable ports is 0 - 79. This parameter displays the destination port for the device rule. If no port exists for this device rule, the term NA is displayed. Destination services with a hyperlink indicate an object group reference. Click the link to view detailed information about one or more object group references . |
User(s)Group(s) | The users or groups that are associated with the relevant rule from the device. |
Protocol(s) | The protocol or group of protocols that are associated with the relevant rule from the device. |
Signature(s) | The signature for this device, which is only displayed for a device rule on an IP device. |
Applications | The applications that are associated with the relevant rule from the device. |