Capabilities in Your JSA Product
JSA product documentation describes functionality such as offenses, flows, assets, and historical correlation, that might not be available in all JSA products. Depending on the product that you are using, some documented features might not be available in your deployment.
Log Manager--Log Manager is a basic, high-performance, and scalable solution for collecting, analyzing, storing, and reporting on large volumes of network and security event logs.
JSA--JSA is an advanced offering that includes the full range of security intelligence capabilities for on-premises deployments. It consolidates log source and network flow data from thousands of assets, devices, endpoints, and applications that are distributed throughout your network, and performs immediate normalization and correlation activities on the raw data to distinguish real threats from false positives.
JSA Product Capabilities
JSA product documentation describes capabilities, such as offenses, flows, assets, and historical correlation, that might not be available in all JSA products. Review the following table to compare the capabilities in each product.
Capability |
JSA |
Log Manager |
---|---|---|
Full administrative capabilities |
Yes |
Yes |
Supports hosted deployments |
No |
No |
Customizable dashboards |
Yes |
Yes |
Custom rules engine |
Yes |
Yes |
Manage network and security events |
Yes |
Yes |
Manage host and application logs |
Yes |
Yes |
Threshold-based alerts |
Yes |
Yes |
Compliance templates |
Yes |
Yes |
Data archiving |
Yes |
Yes |
Juniper X-Force Threat Intelligence IP reputation feed integration |
Yes |
Yes |
WinCollect stand-alone deployments |
Yes |
Yes |
WinCollect managed deployments |
Yes |
Yes |
JSA Vulnerability Manager integration |
Yes |
Yes |
Network activity monitoring |
Yes |
No |
Asset profiling |
Yes |
No 1 |
Offenses management |
Yes |
No |
Network flow capture and analysis |
Yes |
No |
Historical correlation |
Yes |
No |
JSA Vulnerability Manager integration |
Yes |
Yes |
JSA Risk Manager integration |
Yes |
No |
Vulnerability Assessment Scanners |
Yes |
Yes |
1Log Manager tracks asset data only if JSA Vulnerability Manager is installed. |
Some documentation, such as the Juniper Secure Analytics Administration Guide and the Juniper Secure Analytics Users Guide, is common across multiple products and might describe capabilities that are not available in your deployment.