- play_arrow JSA Risk Manager
- play_arrow JSA Risk Manager configuration
- play_arrow Network Device Management
- play_arrow Network Device Management
- Device Discovery Process
- Discovering Devices in your Network
- Importing Multiple Devices from a CSV File
- Adding a Network Device to JSA Risk Manager
- Deleting a Device from JSA Risk Manager
- Finding Network Devices in the Device List
- Adding Device Information to the Topology
- Collecting Neighbor Data to Update the Topology
- Configuring the Discovery Schedule to Populate Device Information
- play_arrow Device Configuration Backup Jobs
- play_arrow Network Connections Overview
- play_arrow Network Connections Overview
- play_arrow Network Device Configuration and Monitoring
- play_arrow Network Device Configuration and Monitoring
- Searching Device Rules
- Filtering Device Rules by User or Group
- Comparing the Configuration of your Network Devices
- Adding or Deleting a Device in JSA Risk Manager
- Backing up a Device to get its Configuration Data
- Discovering Devices in your Network
- play_arrow Log Source Mapping in JSA
- play_arrow Protocol Configuration for Network Devices
- play_arrow Schedules for Discovery and Backup
- play_arrow Firewall Rule Event Counts of Check Point Devices
- play_arrow Network Topology
- play_arrow Network Topology
- play_arrow CIS Benchmark Scans
- play_arrow Network Simulations in JSA Risk Manager
- play_arrow Network Simulations in JSA Risk Manager
- Simulation Tests
- Creating a Simulation
- Duplicating a Simulation
- Manually Running a Simulation
- play_arrow Network Configuration Change Simulation
- Simulating an Attack on an SSH Protocol
- Viewing Simulation Results
- Approving Simulation Results
- Revoking a Simulation Approval
- Assigning Simulations to Group for Tracking
- play_arrow Topology models
- play_arrow Reports
- play_arrow Audit Log Data
Policy Compliance and Policy Risk Changes
SUMMARY Use the JSA Risk Manager Policy Management pages to view details about policy compliance and policy risk changes for assets, policies, and policy checks.
The JSA Risk Manager Policy Management pages display data from the last run policy. You can filter the data by asset, by policy, or by policy check.
Policy Management Use Cases
Use the Policy Management pages with Risk dashboard items to find more information about assets and policies that failed compliance.
- The By Asset page includes information and links to the policies that the assets failed.
- The By Policy page includes information about the number and percentage of assets that passed or failed and, if relevant, a link to the policy checks the policy uses.
- The By Policy Check page includes information about the number and percentages of assets that pass or fail individual policy checks.
Use the Policy Management pages with Risk Change dashboard items to investigate policies and policy checks that display increases in risk. The Risk Change dashboard item contains links to the By Policy and By Policy Checks pages. For more information about configuring dashboards for policy monitoring and monitoring risk change, see the Juniper Secure Analytics Users Guide.