Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Secure Analytics Users Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

X-Force Integration in JSA

date_range 11-May-22

Juniper NetworksX-Force security experts use a series of international data centers to collect tens of thousands of malware samples, to analyze web pages and URLs, and to run analysis to categorize potentially malicious IP addresses and URLs. You can use this data to identify and remediate undesirable activity in your environment before it threatens the stability of your network.

For example, you can identify and prioritize these types of incidents:

  • A series of attempted logins for a dynamic range of IP addresses

  • An anonymous proxy connection to a Business Partner portal

  • A connection between an internal endpoint and a known botnet command and control

  • Communication between an endpoint and a known malware distribution site

footer-navigation