Threat Map Overview
The threat map allows you to visualize geographical regions for incoming and outgoing traffic. You can view blocked and allowed threat events based on feeds from IPS, antivirus, and antispam engines. Unsuccessful login attempts for devices are also displayed. An event count for each attack object can be viewed by clicking a specific geographical location. This is useful for viewing unusual activity that could indicate a possible attack. If you have deployed your firewall devices across the globe, you can find the country that is attacking your firewall devices the most by using the threat map.
The devices can be root device, logical systems (LSYS), or tenant systems (TSYS).
Threats are color-coded and can be seen at the bottom of the page. You also get a quick view of total number of threats blocked and allowed, an individual count of threats blocked and allowed for each event, as well as the top targeted devices, top destination countries, and top source countries.
You can click any individual source or destination point on the map to review information about the threat events, including the number of threat events, type of threat, time of events, source IP, and destination IP. You can also perform further analysis of the attack by clicking the attack type and viewing the filtered list of events from the Event Viewer.
Starting in Junos Space Security Director Release 16.1, you can click a country on the threat map to bring up the respective country page. You can view the total threat events since midnight, followed by inbound and outbound threat events. You see the highest top five inbound and outbound IP addresses. You can also view all IP addresses with the option to block one or more of them. In addition, you can block all traffic or only the inbound and outbound traffic for the selected country.
Click View Details to see more details for the country on the right panel. In addition, you can see total number of inbound and outbound threats for each event.
Table 1 describes different types of threats blocked and allowed.
Attack |
Description |
---|---|
IPS Threat Events |
Intrusion detection and prevention (IDP) attacks detected by the IDP module. The information reported about the attack includes:
|
Spam Events |
E-mail spam that is detected based on the blocklist spam e-mails. The information reported about the attack includes:
|
Virus Events |
Virus attacks detected by the antivirus engine. The information reported about the attack includes:
|
Device Authentications |
The firewall authentication messages generated due to unauthorized attempts to access the network. The reported information contains the reason for authentication failure and the source of the request. |
Screen |
A type of threat detected by SRX Series devices. The information reported about the attack includes:
|
ATP Cloud |
A type of threat detected by SRX Series devices in collaboration with ATP Cloud software. The information reported about the attack includes:
|
Threats with unknown geographical IP addresses are displayed as undefined.