- play_arrow What's New for JSA Users
- play_arrow Capabilities in your JSA product
- play_arrow Dashboard Management
- Dashboard Management
- Default Dashboards
- Custom Dashboards
- Creating a Custom Dashboard
- Using the Dashboard to Investigate Log or Network Activity
- Configuring Dashboard Chart Types
- Removing Dashboard Items
- Detaching a Dashboard Item
- Renaming a Dashboard
- Deleting a Dashboard
- Managing System Notifications
- Adding Search-based Dashboard Items to the Add Items List
- play_arrow QRadar Analyst Workflow
- play_arrow Offense Management
- play_arrow Log Activity Investigation
- play_arrow Network Activity Monitoring
- play_arrow Asset Management
- play_arrow Chart Management
- play_arrow Event and Flow Searches
- play_arrow Custom Event and Flow Properties
- play_arrow Rules
- play_arrow Historical Correlation
- play_arrow Report Management
X-Force Data on the Dashboard
The Internet Threat Information Center widget on the Threat and Security Monitoring dashboard uses X-Force data to provide up-to-date advisories on security issues, daily threat assessments, security news, and threat repositories.
The dashboard widget uses an embedded RSS feed to display X-Force data in the dashboard widget. The JSA console must have access to the Internet to receive data from the X-Force update server (www.iss.net).
The dashboard uses four AlertCon threat level images to provide a visual indicator of the current threat level.
Level | Type | Description |
---|---|---|
1 | Normal threats | Ordinary activity that compromises unprotected networks, minutes to hours after JSA connects to the Internet. |
2 | Increased vigilance | Vulnerabilities or online threats to computer networks that requires vulnerability assessment and corrective action. |
3 | Focused attacks | Specific weakness and vulnerabilities that are the target of Internet attacks and require immediate defensive action. |
4 | Catastrophic threats | Critical security situations within a network that dictate an immediate and focused defensive action. This condition might be imminent or ongoing. |
For more information about the current threat level, click the Learn More link to open the Current Threat Activity page on the Juniper X-Force Exchange website.
To view a summary of the current advisories, click the arrow icon next to the advisory. To investigate the full advisory, click the advisory link.