- play_arrow Introduction
- play_arrow Dashboard
- play_arrow Monitor
- play_arrow Alerts
- play_arrow Logs
- play_arrow Maps and Charts
- play_arrow Tunnel Status
- play_arrow Service Locations
- play_arrow Advanced Threat Prevention
- Hosts Overview
- Host Details
- Threat Sources Overview
- Threat Source Details
- Reverse Shell Overview
- Add IP Address to Allowlist
- HTTP File Download Overview
- HTTP File Download Details
- Signature Details
- Manual Scanning Overview
- SMB File Download Overview
- SMB File Download Details
- Email Attachments Scanning Overview
- Email Attachments Scanning Details
- DNS DGA Detection Overview
- DNS Tunnel Detection Overview
- DNS DGA and Tunneling Detection Details
- Encrypted Traffic Insights Overview
- Encrypted Traffic Insights Details
- SMTP Quarantine Overview
- IMAP Block Overview
- Telemetry Overview
- play_arrow Reports
- play_arrow Report Definitions
- Report Definitions Main Page Fields
- Create and Manage Threat Assessment Report Definitions
- Create and Manage Application User Usage Report Definitions
- Create and Manage IPS Report Definitions
- Create and Manage Rule Analysis Report Definitions
- Create and Manage Security Events Report Definitions
- Create and Manage Top Talkers Report Definitions
- Create and Manage Network Operations Report Definitions
- Create and Manage URLs Visited Per User Report Definitions
- Create and Manage Log Streaming Report Definitions
- Using Report Definitions
- Editing Report Definitions
- Deleting Report Definitions
- play_arrow Generated Reports
- play_arrow ATP Report Definitions
- play_arrow ATP Generated Reports
- play_arrow Secure Edge Reports
-
- play_arrow SRX Device Management
- play_arrow Devices
- Devices Overview
- Add Devices
- Enroll SRX Series Firewalls from ATP Cloud to Juniper Security Director Cloud
- Disenroll SRX Series Firewall from ATP Cloud
- Device Subscriptions
- Add Licenses
- Import Device Certificates
- Configure Security Logs
- Configuration Versions
- Out-of-Band Changes
- Resolve Out-of-Band Changes
- Resynchronize Devices
- Upgrade Devices
- Reboot Devices
- Delete Devices
- play_arrow Device Groups
- play_arrow Preprovision Profiles
- play_arrow Configuration Templates
- play_arrow Images
- play_arrow Security Packages
-
- play_arrow SRX Security Policy
- play_arrow SRX Security Policies
- play_arrow SRX Security Policy Rules
- Security Policy Rules Overview
- Security Policy Rule Analysis Overview
- Add and Manage Security Policy Rules
- Analyze Security Policy Rules
- Edit, Clone, and Delete a Security Policy Rule
- Reorder a Security Policy Rule
- Configure Default Rule Option
- Select a Security Policy Rule Source
- Select a Security Policy Rule Destination
- Select Applications and Services
- Common Operations on a Security Policy Rule
- Add SRX Policy Rules to Secure Edge Policy (From SRX Policy Page)
- play_arrow SRX Security Policy Versions
- play_arrow Device View
-
- play_arrow SRX Security Subsciptions
- play_arrow IPS Profiles
- play_arrow IPS Signatures
- play_arrow Content Security
- play_arrow Content Security Profiles
- play_arrow Web Filtering Profiles
- play_arrow Antivirus Profiles
- play_arrow Antispam Profiles
- play_arrow Content Filtering Profiles
- play_arrow Content Filtering Policies (New)
- play_arrow Decrypt Profiles
- play_arrow SecIntel
- play_arrow SecIntel Profiles
- play_arrow SecIntel Profile Groups
- play_arrow Anti-Malware
- play_arrow Secure Web Proxy
- play_arrow Flow-Based Antivirus
- play_arrow ICAP Redirect Profile
- play_arrow Metadata Streaming Policy
- Security Metadata Streaming Policies Overview
- Create and Manage Metadata Streaming Profiles
- Create and Manage Metadata Streaming Profiles to Detect all DNS Threats
- Create and Manage Metadata Streaming Profiles to Detect DGA-Based Threats
- Create and Manage Metadata Streaming Profiles to Detect DNS Tunnels
- Create and Manage Metadata Streaming Profiles to Detect all HTTP Threats
- Create and Manage Metadata Streaming Profiles to Detect Command-and-Control (C2) Communications
- Edit, Clone, or Delete Metadata Streaming Profile
- Create and Manage Metadata Streaming Rules
- Edit or Delete Metadata Streaming Rule
- Deploy Metadata Streaming Policy
- Import Metadata Streaming Policy and DNS Cache
- play_arrow DNS Filter
-
- play_arrow SRX IPSec VPN
- play_arrow IPsec VPNs
- IPsec VPN Overview
- Understanding IPsec VPN Modes
- Understanding IPsec VPN Routing
- Understanding IKE Authentication
- IPsec VPN Global Settings
- Create a Policy-Based Site-to-Site VPN
- Create a Route-Based Site-to-Site VPN
- Create a Hub-and-Spoke (Establishment All Peers) VPN
- Create a Hub-and-Spoke (Establishment by Spokes) VPN
- Create a Hub-and-Spoke Auto Discovery VPN
- Create a Remote Access VPN—Juniper Secure Connect
- Importing IPsec VPNs
- Deploy an IPsec VPN
- Modify IPsec VPN Settings
- Delete an IPsec VPN
- play_arrow VPN Profiles
- play_arrow Extranet Devices
-
- play_arrow SRX NAT
- play_arrow NAT Policies
- play_arrow NAT Pools
- Devices with NAT Policies
-
- play_arrow SRX Identity
- play_arrow JIMS
- play_arrow Active Directory
- play_arrow Access profile
- play_arrow Address Pools
-
- play_arrow Secure Edge Security Policy
- Secure Edge Policy Overview
- Add and Manage Secure Edge Policy Rules
- Edit, Clone, and Delete a Secure Edge Policy Rule
- Reorder a Security Policy Rule
- Select a Secure Edge Policy Source
- Select a Secure Edge Policy Destination
- Select Applications and Services
- Common Operations on a Secure Edge Policy
- Deploy Secure Edge Policies
- Add SRX Policy Rules to Secure Edge Policy (From Secure Edge Policy Page)
- play_arrow Secure Edge Security Subscriptions
- IPS Policies Overview
- IPS Policies Overview
- Create and Manage IPS Rules
- Edit, Clone, and Delete IPS Rules
- Create and Manage Exempt Rules
- Edit, Clone, and Delete Exempt Rule
- Web Filtering Profiles Overview
- Web Filtering Profiles Overview
- Create and Manage Web Filtering Profiles
- Edit, Clone, and Delete a Web Filtering Profile
- CASB Overview
- CASB Profiles Overview
- Create and Manage CASB Profiles
- Edit and Delete a CASB Profile
- CASB Rules Overview
- Add and Manage CASB Profile Rules
- Edit and Delete a CASB Rule
- Application Instances Overview
- Create and Manage Application Instances
- Edit and Delete an Application Instance
- Application Tagging Overview
- Content Filtering Policies Overview
- Content Filtering Policies Overview
- Create and Manage Content Filtering Policies
- Add and Manage Content Filtering Policy Rules
- Edit and Delete a Content Filtering Policy
- Edit, Clone, and Delete a Content Filtering Policy Rule
- SecIntel Profiles Overview
- SecIntel Profiles Overview
- Create and Manage Command and Control Profiles
- Create and Manage DNS Profiles
- Create and Manage Infected Hosts Profiles
- Edit, Clone, and Delete SecIntel Profile
- SecIntel Profile Groups Overview
- Create and Manage SecIntel Profile Groups
- Edit, Clone, and Delete SecIntel Profile Group
- Anti-malware Profiles Overview
- About Anti-malware Profiles
- Create and Manage Anti-malware Profiles
- Edit, Clone, and Delete Anti-malware Profile
- Create a DNS Security Profile
- Create an Encrypted Traffic Insights Profile
- play_arrow Secure Edge Service Administration
- Certificate Management Overview
- Certificate Management Overview
- Generate and Manage Certificates
- Upload and Download a Certificate
- Regenerate and Delete a Certificate
- Add Juniper Clouds Root CA Certificate on Microsoft Windows
- Add Juniper Clouds Root CA Certificate on MacOS
- Add Juniper Clouds Root CA Certificate in Google Chrome
- Add Juniper Clouds Root CA Certificate in Mozilla Firefox
- Proxy Auto Configuration Files Overview
- Proxy Auto Configuration (PAC) Files Overview
- Edit, Clone, and Delete a Proxy Auto Configuration File
- Distribute a Proxy Auto Configuration File URL to Web Browsers
- Manually Add a Proxy Auto Configuration File URL to a Web Browser
- Configure an Explicit Proxy Profile
- Decrypt Profiles Overview
- Decrypt Profiles Overview
- Create and Manage Decrypt Profiles
- Edit, Clone, and Delete a Decrypt Profile
- play_arrow Secure Edge Identity
- End User Authentication Overview
- About the End User Authentication Page
- Add and Manage End User Profiles
- Create a SAML Profile
- Create an LDAPS Profile
- Manage the Hosted Database
- Edit and Delete an End User Profile
- Add and Manage Groups
- Edit and Delete a Group
- Juniper Identity Management Service Overview
- Juniper Identity Management Service Overview
- JIMS Collector Onboarding Overview
- Onboard JIMS Collector
- Create JIMS Collector Service Accounts
- Install JIMS Collector
- Configure JIMS Collector to Get Information from the Directory Service
- Configure JIMS Collector to Get Microsoft Event Logs
- Configure JIMS Collector to Probe Unknown IP Addresses
- Delete JIMS Collector
- Authentication Settings Overview
- Configure the Authentication Frequency
- play_arrow Secure Edge CASB and DLP
- play_arrow Shared Services Firewall Policies
- play_arrow Rule Options
- play_arrow Redirect Profiles
-
- play_arrow Shared Services Objects
- play_arrow Addresses
- play_arrow GeoIP
- play_arrow Services
- play_arrow Applications
- play_arrow Schedules
- play_arrow URL Patterns
- play_arrow URL Categories
- play_arrow SSL Initiation Profile
-
- play_arrow Shared Services Advanced Threat Prevention
- Enroll an SRX Series Firewall using Juniper ATP Cloud Web Portal
- Remove an SRX Series Firewall From Juniper Advanced Threat Prevention Cloud
- Search for SRX Series Firewalls Within Juniper Advanced Threat Prevention Cloud
- Device Information
- File Inspection Profiles Overview
- Create File Inspection Profiles
- Email Management Overview
- Configure SMTP Email Management
- Configure IMAP Email Management
- Adaptive Threat Profiling Overview
- Create an Adaptive Threat Profiling Feed
- Allowlists Overview
- Create Allowlists
- Blocklists Overview
- Create Blocklists
- SecIntel Feeds Overview
- Configure DAG Filter
- Global Configuration for Infected Hosts
- Enable Logging
- Configure Threat Intelligence Sharing
- Configure Trusted Proxy Servers
- Configure Webhook
- play_arrow Administration
- play_arrow Subscriptions
- play_arrow Users & Roles
- play_arrow Single Sign-On Configuration
- play_arrow Two-Factor Authentication
- play_arrow Audit Logs
- play_arrow Service Updates
- play_arrow Jobs
- play_arrow Data Management
- play_arrow Log Streaming
- play_arrow URL Recategorization
- play_arrow API Security
- play_arrow Organization
- play_arrow ATP Mapping
- play_arrow ATP Audit Logs
- play_arrow ATP Application Tokens
-
Juniper Secure Edge Overview
Juniper Secure Edge provides full-stack Secure Services Edge (SSE) capabilities to protect web, SaaS, and on-premise applications and provide users with consistent and secure access that follows them wherever they go. When combined with Juniper’s AI-Driven SD-WAN, Juniper Secure Edge provides a best-in-suite SASE solution that helps you deliver seamless and secure end-user experiences that leverage existing architectures and grow with them as they expand their SASE footprint.
Juniper Secure Edge provides a user-friendly and security-focused GUI interface that allows an administrator to perform specific tasks. When you log in to Juniper Secure Edge, the main menu on the left that is displayed and the actions that you can perform depend on your access privileges. Table 1 lists the main menu that is available in Juniper Secure Edge, a brief description of each menu item, and a link to the relevant topic in the Juniper Secure Edge User Guide.
Menu | Description |
---|---|
Dashboard | You can view information such as top events, top denials, top applications, top source and destination IP addresses, top traffic, and top infected hosts in graphical security widgets. These security widgets offer users a customized view of network security and can be added, removed, and rearranged as per each user's preference. See About the Dashboard. |
Monitor | You can view following information from the Monitor menu:
|
Secure Edge | You can manage the following services from the Secure Edge menu:
|
Shared Services | ATP—Configure various settings to protect against compromised hosts, malicious threat sources, suspicious file downloads, Domain Name System (DNS) Domain Generation Algorithm (DGA) detections, tunnel detections, encrypted traffic insights, quarantined e-mails, blocked e-mails, and telemetry of blocked web and email files in Juniper Advanced Threat Prevention Cloud (ATP Cloud). See File Inspection Profiles Overview. |
Benefits of Juniper Secure Edge
Secure the Remote Workforce—Support the WFA workforce wherever users are located. Security policies follow the user wherever they go, whether they’re on or off the network.
Single-Policy Framework: Use the same policy framework as with the SRX Series Firewalls and apply security policies to remote users and branch sites. Create policies once and apply everywhere with unified policy management, including user- and application-based access, IPS, anti-malware and secure web access within a single policy framework.
Leverage Existing Investments—Moving to a cloud-based security architecture shouldn’t mean abandoning existing IT investments. Organizations can transition at their own pace without forcing administrators to toggle between separate management platforms for on-premises and cloud-delivered security. Juniper customers can use the physical, virtual, containerized SRX firewalls, and now cloud-delivered Secure Edge services, completely managed by Security Director Cloud with a single-policy framework, allowing for full visibility and consistent security across both the edge and the data center from one UI.
Dynamic User Segmentation Based on Zero Trust Principles—Maintain the security of data around identity- and risk-driven policies. Juniper Secure Edge delivers a consistent security policy framework with policies that automatically adapt based on new risk and attack vectors and follow the user wherever they go, providing secure access to employees and third-party contractors through granular policy control, to further protect data by adhering to Zero Trust principles.
Security Assurance—Whether it’s a rule for a traditional firewall policy or policy delivered as a service, it’s important that rules are placed in the proper order to be effective when needed. With Juniper Secure Edge organizations can utilize Security Director Cloud’s automation, and duplicate and shadowed rules are flagged before committed. Rule hit counts are highlighted so administrators can quickly make changes, ensuring that policies are effective for the intended users at the intended time, and makes cleaning up deprecated rules easy for the organization when they know these rules are no longer in use. This takes a big chunk of the stress out of day-to-day operations.
Integrate with Any Identity Provider—Juniper Secure Edge is flexible and easily integrates with any identity service to define user-based policies and application usage based on individual users or user groups via direct integration with Azure AD and Okta, and SAML 2.0 support to integrate with all other identity services.
Proven Security Effectiveness—Validated protection from attacks that is more than 99% effective against client- and server-side exploits, malware and C2 traffic, regardless of where the users and applications are located, ensuring consistent security enforcement.
Create Your Juniper Secure Edge Organization
- Open the URL to the Juniper Security Director Cloud portal.
- In the portal, click Create an Organization Account.
The Login Credentials page opens. Use this page to set the login credentials for your account.
- Enter the following details and click Next.
- E-mail address—your preferred e-mail address.
- Password—a password of your choice.
The Contact Details page opens.
- Enter your full name, company name, country, the phone number for your organization and
click Next.
The Organization Account Details page opens.
- Type the name of your organization or the organization that will be using Juniper Security Director Cloud to manage devices.
- Read the terms and conditions of use, and if you agree, click Create
Organization Account.
You will receive an e-mail to verify your e-mail address and to send a request to the Juniper Security Director Cloud team to activate your organization account.
- Log in to your e-mail account, open the e-mail, and click Activate
Organization Account to send a request to activate your organization account.Note:
You must verify your e-mail address and click the Activate Organization Account button within 24 hours after receiving the e-mail. Otherwise, your account details will be deleted from Juniper Security Director Cloud, and you will have to re-create your account and send the activation request.
After verifying your e-mail and sending the account activation request, you will receive an e-mail about your organization account activation status within 7 working days.
If your account activation request is approved, you will receive an e-mail with log in page information.
- Click Go to Login Page and enter your e-mail address and password to log in and start using the Juniper Security Director Cloud portal.