Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Announcement: Try the Ask AI chatbot for answers to your technical questions about Juniper products and solutions.

close
header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Security Director Cloud User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Create and Manage Metadata Streaming Profiles to Detect all HTTP Threats

date_range 14-Feb-25
  1. In the Metadata Streaming Profiles section, click +.
    The Create Metadata Streaming Profile page is displayed.
  2. Enter a unique profile name within 63 alphanumeric characters. You can use special characters such as _ and -.
  3. In the HTTP section, enable the All toggle button. When you enable this option, you cannot configure detection of command-and-control (C2) communications.
    Note:

    When you enable the toggle button, the option to configure settings for command-and-control (C2) communications are hidden.

  4. Select how you want to log a request:
    • Log detections—Log the request only if a threat is detected.

    • Log everything—Log all requests received by the device.

  5. Click OK.
    The metadata streaming profile is created and displayed on the Metadata Streaming Policy page.
Manage Metadata Streaming Profiles
  • Edit—Select the profile, and then click .

  • Clone—Select the profile, and then click More > Clone.

    Note:

    By default, the profile name is suffixed with _copy_1.

  • Delete—Select the profile, and then click .

footer-navigation