- play_arrow JSA Risk Manager
- play_arrow JSA Risk Manager configuration
- play_arrow Network Device Management
- play_arrow Network Device Management
- Device Discovery Process
- Discovering Devices in your Network
- Importing Multiple Devices from a CSV File
- Adding a Network Device to JSA Risk Manager
- Deleting a Device from JSA Risk Manager
- Finding Network Devices in the Device List
- Adding Device Information to the Topology
- Collecting Neighbor Data to Update the Topology
- Configuring the Discovery Schedule to Populate Device Information
- play_arrow Device Configuration Backup Jobs
- play_arrow Network Connections Overview
- play_arrow Network Connections Overview
- play_arrow Network Device Configuration and Monitoring
- play_arrow Network Device Configuration and Monitoring
- Searching Device Rules
- Filtering Device Rules by User or Group
- Comparing the Configuration of your Network Devices
- Adding or Deleting a Device in JSA Risk Manager
- Backing up a Device to get its Configuration Data
- Discovering Devices in your Network
- play_arrow Log Source Mapping in JSA
- play_arrow Protocol Configuration for Network Devices
- play_arrow Schedules for Discovery and Backup
- play_arrow Firewall Rule Event Counts of Check Point Devices
- play_arrow Network Topology
- play_arrow Network Topology
- play_arrow CIS Benchmark Scans
- play_arrow Network Simulations in JSA Risk Manager
- play_arrow Network Simulations in JSA Risk Manager
- Simulation Tests
- Creating a Simulation
- Duplicating a Simulation
- Manually Running a Simulation
- play_arrow Network Configuration Change Simulation
- Simulating an Attack on an SSH Protocol
- Viewing Simulation Results
- Approving Simulation Results
- Revoking a Simulation Approval
- Assigning Simulations to Group for Tracking
- play_arrow Topology models
- play_arrow Reports
- play_arrow Audit Log Data
Network Risk Assessment
SUMMARY Create and define specific risk questions about your network to assess or monitor risk that is based on the analysis of risk indicators.
In Policy Monitor, you can define policies, assess adherence to a policy, evaluate results of questions, and monitor new risks.
Default question templates are available help you to assess and monitor the risk on your network. You can use one of the default question templates as a basis for your own questions or you can create a new question. You can find the default question templates in the Group menu on the Policy Monitor page.
You can choose from the following list of risk indicators:
- Network activity measures risk based on network communications that occurred in the past.
- Configuration and topology measure risk that is based on possible communication and network connections.
- Vulnerabilities measure risk that is based on your network configuration and vulnerability scan data that is collected from network assets.
- Firewall rules measures risk based on the enforcement or absence of firewall rules that are applied across the network.
You can define tests that are based on the risk indicators, and then restrict the test results to filter the query for specific results or violations.
Security professionals create questions for assets, devices, or rules to flag risks in their networks. The risk level for an asset, device, or rule is reported when a question is submitted to the Policy Monitor. You can approve results that are returned from assets or define how you want the system to respond to unapproved results.
Use Policy Monitor question results to assess risk for many security-risk scenarios such as the following scenarios:
- Use of forbidden protocols to communicate.
- Communication with forbidden networks or assets.
- Firewall rules don't comply with corporate policy.
- Systems prone to high-risk vulnerabilities because of their network configuration.