- play_arrow What's New for JSA Users
- play_arrow Dashboard Management
- Dashboard Management
- Default Dashboards
- Custom Dashboards
- Creating a Custom Dashboard
- Using the Dashboard to Investigate Log or Network Activity
- Configuring Dashboard Chart Types
- Removing Dashboard Items
- Detaching a Dashboard Item
- Renaming a Dashboard
- Deleting a Dashboard
- Managing System Notifications
- Adding Search-based Dashboard Items to the Add Items List
- play_arrow QRadar Analyst Workflow
- play_arrow Offense Management
- play_arrow Log Activity Investigation
- play_arrow Network Activity Monitoring
- play_arrow Asset Management
- play_arrow Chart Management
- play_arrow Event and Flow Searches
- play_arrow Custom Event and Flow Properties
- play_arrow Rules
- play_arrow Historical Correlation
- play_arrow Juniper Networks X-Force Integration
- play_arrow Report Management
Capabilities in Your JSA Product
JSA product documentation describes functionality such as offenses, flows, assets, and historical correlation, that might not be available in all JSA products. Depending on the product that you are using, some documented features might not be available in your deployment.
Log Manager--Log Manager is a basic, high-performance, and scalable solution for collecting, analyzing, storing, and reporting on large volumes of network and security event logs.
JSA--JSA is an advanced offering that includes the full range of security intelligence capabilities for on-premises deployments. It consolidates log source and network flow data from thousands of assets, devices, endpoints, and applications that are distributed throughout your network, and performs immediate normalization and correlation activities on the raw data to distinguish real threats from false positives.
JSA Product Capabilities
JSA product documentation describes capabilities, such as offenses, flows, assets, and historical correlation, that might not be available in all JSA products. Review the following table to compare the capabilities in each product.
Capability | JSA | Log Manager |
---|---|---|
Full administrative capabilities | Yes | Yes |
Supports hosted deployments | No | No |
Customizable dashboards | Yes | Yes |
Custom rules engine | Yes | Yes |
Manage network and security events | Yes | Yes |
Manage host and application logs | Yes | Yes |
Threshold-based alerts | Yes | Yes |
Compliance templates | Yes | Yes |
Data archiving | Yes | Yes |
Juniper X-Force Threat Intelligence IP reputation feed integration | Yes | Yes |
WinCollect stand-alone deployments | Yes | Yes |
WinCollect managed deployments | Yes | Yes |
JSA Vulnerability Manager integration | Yes | Yes |
Network activity monitoring | Yes | No |
Asset profiling | Yes | No 1 |
Offenses management | Yes | No |
Network flow capture and analysis | Yes | No |
Historical correlation | Yes | No |
JSA Vulnerability Manager integration | Yes | Yes |
JSA Risk Manager integration | Yes | No |
Vulnerability Assessment Scanners | Yes | Yes |
1Log Manager tracks asset data only if JSA Vulnerability Manager is installed. |
Some documentation, such as the Juniper Secure Analytics Administration Guide and the Juniper Secure Analytics Users Guide, is common across multiple products and might describe capabilities that are not available in your deployment.