Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Mist Management Guide
Table of Contents Expand all
list Table of Contents

Additional Information About Security

date_range 04-Mar-25

Configuring Other Security Settings

See the following guides for additional security-related information:

  • Juniper Mist Access Assurance Guide—Includes information about authentication methods, identity provider integration, digital certificates, BYOD PSK, and more.

  • Juniper Mist AI-Native Operations Guide—Includes information about monitoring security alerts (among other alerts that you can monitor and manage with Juniper Mist).

  • Juniper Mist Automation and Integration Guide—Covers various options for automation and integration, including security procedures such as configuring an API token, and monitoring security alerts with webhooks.

  • Juniper Mist WAN Assurance Configuration Guide

    —Contains extensive information about configuring WAN security, including options such as Secure Edge services, application policies, IDP-based threat detection, and application visibility. After your network is up and running, you can monitor the status of services such as intrusion detection and prevention, URL filtering, and application visibility.
  • Juniper Mist Wired Assurance Configuration Guide—Covers additional security settings for your wired network. For example, when you add switch configuration templates, configure a campus fabric topology, and set up port profiles, you can configure a number of security settings.

  • Juniper Mist Wireless Assurance Configuration Guide—Covers additional security settings for your wireless network. For example, when you add WLANs and WLAN templates or set up a guest portal, you can configure a number of security settings to protect your wireless network and ensure compliance with standards such as Payment Card Industry Data Security Standard (PCI DSS). In addition, after your network is up and running, Juniper Mist assists you in identifying potential security threats such as rogue APs, honeypots, and neighbor APs.

Additional Security Information

Juniper Mist supports SOC 2 Type II attestation of compliance (AOC). This attestation underscores our ongoing commitment to protecting customers’ data. In order to obtain Juniper Mist - SOC 2 Type II report, contact your Juniper Account Representative.

For more security information, use these links below.

Note:

This list is provided for reference. Contact your Juniper Mist account representative for full information relevant to your account, services, and licenses.

file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right
footer-navigation
keyboard_arrow_down
file_download
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
language