About Reports Page
Overview
You are here: Monitor > Reports.
Use the Reports menu to generate reports on demand. There are several predefined reports listed in this page, see Table 1. The generated report is displayed in HTML format. You can group multiple reports and generate a consolidated report.
Reports page is available on all the SRX Series Firewalls except the SRX5000 line of devices.
Logical system and tenant support the reports listed in Table 1 only for SRX1500, SRX1600, SRX2300, SRX4100, SRX4200, and SRX4600.
Report Name |
Root |
Logical System Users |
Tenant Users Support |
---|---|---|---|
Threat Assessment Report |
Yes |
Yes |
Yes |
Application and User Usage |
Yes |
Yes |
Yes |
Top Talkers |
Yes |
Yes |
Yes |
IPS Threat Environment |
Yes |
Yes |
No |
URL Report |
Yes |
Yes |
Yes |
Viruses Blocked |
Yes |
Yes |
No |
Virus: Top Blocked |
Yes |
Yes |
No |
Top Firewall Events |
Yes |
Yes |
Yes |
Top Firewall Deny Destinations |
Yes |
Yes |
Yes |
Top Firewall Denies |
Yes |
Yes |
Yes |
Top IPS Events |
Yes |
Yes |
No |
Top Anti-spam Detected |
Yes |
Yes |
No |
Top Screen Attackers |
Yes |
Yes |
Yes |
Top Screen Victims |
Yes |
Yes |
Yes |
Top Screen Hits |
Yes |
Yes |
Yes |
Top Firewall Rules |
Yes |
Yes |
Yes |
Top Firewall Deny Sources |
Yes |
Yes |
Yes |
Top IPS Attack Sources |
Yes |
Yes |
Yes |
Top IPS Attack Destinations |
Yes |
Yes |
No |
Top IPS Rules |
Yes |
Yes |
No |
Top Web Apps |
Yes |
Yes |
No |
Top Applications Blocked |
Yes |
Yes |
No |
Top URLs by User |
Yes |
Yes |
No |
Top Source Zone by Volume |
Yes |
Yes |
Yes |
Top Applications by User |
Yes |
Yes |
Yes |
Top Botnet Threats By Source Address via IDP Logs |
Yes |
Yes |
No |
Top Botnet Threats by Destination Address via IDP Logs |
Yes |
Yes |
No |
Top Botnet Threats by Threat Severity via IDP Logs |
Yes |
Yes |
No |
Top Malware Threats by Source Address via IDP Logs |
Yes |
Yes |
No |
Top Malware Threats by Destination Address via IDP Logs |
Yes |
Yes |
No |
Top Malware Threats by Threat Severity via IDP Logs |
Yes |
Yes |
No |
Top Blocked Applications via Webfilter Logs |
Yes |
Yes |
No |
Top Permitted Application Subcategories by Volume via Webfilter Logs |
Yes |
Yes |
No |
Top Permitted Application Subcategories by Count via Webfilter Logs |
Yes |
Yes |
No |
Generate Reports
To generate a report:
Click Reports.
Select the predefined report name and click Generate Report.
The Report Title window appears.
Note:You can select single or multiple report names or all the predefined report names and generate a consolidated report. But you cannot generate group and individual reports at the same time.
Complete the configuration according to the guidelines provided in Table 2.
Click Save to save the generated report in the desired location.
A reported is generated. The report includes, the time when it was generated, the table of contents, and the result (a bar graph, a tabular format, and so on). If there is no data available, the report shows,
No data to display
.
Field |
Action |
---|---|
Name |
Enter a name of the report. Maximum 60 characters. |
Customer Name |
Enter a customer name. Default value is Juniper. |
Description |
Enter a description of the report. |
Show Top |
Use the up and down arrow to select the number of records to display in the report. |
Show Details |
Select an option from the list:
|
Time Span |
Select a predefined time span from the list for the report. |
From |
Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats) to start the report generation. Note:
This option is available when you choose Custom for Time Span. |
To |
Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats) to stop the report generation. Note:
This option is available when you choose Custom for Time Span. |
Sorting Options | |
Show Details |
Click the arrow next to Sorting Options and select one of the options from the list:
|
Threat Assessment Report
Threat Assessment report contains the following content:
Executive Summary
Application Risk Assessment
Threat & Malware Assessment
User and Web Access Assessment
The Threat Assessment report displays a new Filename column in the Malware downloaded by User table. This column helps to identify the malware filename.
Application and User Usage
Application and User Usage report contains the following content:
Top High Risk Applications by Bandwidth
Top High Risk Applications By Count
Top Categories By Bandwidth
Top Applications By Bandwidth
Top Categories By Count
Top Applications By Count
Top Users Of High Risk Applications By Bandwidth
Top Users By Bandwidth
High Risk Applications Allowed Per User
High Risk Applications Blocked Per User
Top Talkers
Top Talkers report contains the following content:
Top Source IPs by Bandwidth
Top Destination IPs by Bandwidth
Top Source IPs by Session
Top Destination IPs by Session
Top Users By Bandwidth
Top Users By Count
IPS Threat Environment
IPS Threat Environment report contains the following content:
IPS Attacks by Severity Over Time
Total IPS Attacks by Severity
Top IPS Categories Blocked
Top IPS Attacks Blocked
Top Targeted Hosts by IP
Top Targeted Hosts by User
IPS Threat Environment report is not supported for tenant users.
Viruses Blocked
Viruses Blocked report contains the following content:
Total Viruses Blocked Over Time
Top Viruses Blocked
Viruses Blocked is not supported for tenant users.
URL Report
URL Report contains the following content:
Top URLs by Bandwidth
Top URLs by Count
Top URL Categories by Bandwidth
Top URL Categories by Count
Total URLs Blocked Over Time
Top Blocked URLs
Top Blocked URL Categories by Count
Users With Most Blocked URLs
Virus: Top Blocked
Virus: Top Blocked report contains Virus: Top Blocked content.
Virus: Top Blocked is not supported for tenant users.
Top Firewall Events
Top Firewall Events report contains Top Firewall Events.
Top Firewall Deny Destinations
Top Firewall Deny Destinations report contains Top Firewall Deny Destinations.
Top Firewall Denies
Top Firewall Denies report contains Top Firewall Denies.
Top IPS Events
Top IPS Events report contains Top IPS Events.
Top IPS Events is not supported for tenant users.
Top Anti-spam Detected
Top Anti-Spam Detected report Top Anti-spam Detected.
Top Anti-spam Detected is not supported for tenant users.
Top Screen Attackers
Top Screen Attackers report contains Top Screen Attackers.
Top Screen Victims
Top Screen Victims report contains Top Screen Victims.
Top Screen Hits
Top Screen Hits report contains Top Screen Hits.
Top Firewall Rules
Top Firewall Rules report contains Top Firewall Rules.
Top Firewall Deny Sources
Top Firewall Deny Sources report contains Top Firewall Deny Sources.
Top IPS Attack Sources
Top IPS Attack Sources report contains Top IPS Attack Sources.
Top IPS Attack Destinations
Top IPS Attack Destinations report contains Top IPS Attack Destinations.
Top IPS Attack Destinations is not supported for tenant users.
Top IPS Rules
Top IPS Rules report contains Top IPS Rules.
Top IPS Rules is not supported for tenant users.
Top Web Apps
Top Web Apps report contains Top Web Apps.
Top Web Apps is not supported for tenant users.
Top Applications Blocked
Top Applications Blocked report contains Top Applications Blocked.
Top Applications Blocked is not supported for tenant users.
Top URLs by User
Top URLs by User report contains Top URLs by User.
Top URLs by User is not supported for tenant users.
Top Source Zone by Volume
Top Source Zone by Volume report contains Top Source Zone by Volume.
Top Applications by User
Top Applications by User report contains Top Applications by User.
Top Botnet Threats By Source Address via IDP Logs
Top Botnet Threats By Source Address via IDP Logs report contains Top Botnet Threats By Source Address via IDP Logs.
Top Botnet Threats By Source Address via IDP Logs is not supported for tenant users.
Top Botnet Threats by Destination Address via IDP Logs
Top Botnet Threats by Destination Address via IDP Logs report contains Top Botnet Threats by Destination Address via IDP Logs.
Top Botnet Threats by Destination Address via IDP Logs is not supported for tenant users.
Top Botnet Threats by Threat Severity via IDP Logs
Top Botnet Threats by Threat Severity via IDP Logs report contains Top Botnet Threats by Threat Severity via IDP Logs.
Top Botnet Threats by Threat Severity via IDP Logs is not supported for tenant users.
Top Malware Threats by Source Address via IDP Logs
Top Malware Threats by Source Address via IDP Logs report contains Top Malware Threats by Source Address via IDP Logs.
Top Malware Threats by Source Address via IDP Logs is not supported for tenant users.
Top Malware Threats by Destination Address via IDP Logs
Top Malware Threats by Destination Address via IDP Logs report contains Top Malware Threats by Destination Address via IDP Logs.
Top Malware Threats by Destination Address via IDP Logs is not supported for tenant users.
Top Malware Threats by Threat Severity via IDP Logs
Top Malware Threats by Threat Severity via IDP Logs report contains Top Malware Threats by Threat Severity via IDP Logs.
Top Malware Threats by Threat Severity via IDP Logs is not supported for tenant users.
Top Blocked Applications via Webfilter Logs
Top Blocked Applications via Webfilter Logs report contains Top Blocked Applications via Webfilter Logs.
Top Blocked Applications via Webfilter Logs is not supported for tenant users.
Top Permitted Application Subcategories by Volume via Webfilter Logs
Top Permitted Application Subcategories by Volume via Webfilter Logs report contains Top Permitted Application Subcategories by Volume via Webfilter Logs.
Top Permitted Application Subcategories by Volume via Webfilter Logs is not supported for tenant users.
Top Permitted Application Subcategories by Count via Webfilter Logs
Top Permitted Application Subcategories by Count via Webfilter Logs report contains Top Permitted Application Subcategories by Count via Webfilter Logs.
Top Permitted Application Subcategories by Count via Webfilter Logs is not supported for tenant users.