Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Security Director Cloud User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Create and Manage Threat Assessment Report Definitions

date_range 17-Feb-25
The threat assessment report provides an assessment of threats that target applications by bypassing traditional network-layer protections. The report also analyzes insider threats from users by allowing them unlimited access to these applications.
  1. Click Monitor > Reports > Report Definitions.
  2. Click Create, and select Threat Assessment Report.
  3. Complete the configuration according to the following guidelines:
    Table 1: Threat Assessment Report Definition Settings

    Settings

    Guidelines

    General Information

    Report Name

    Enter a unique string for the report name containing maximum 64 alphanumeric characters.

    The name can contain dashes.

    Description

    Enter a description containing maximum 900 characters for the report.

    Content

    Time Span

    Specify the duration for which the report is generated.

    You can select a time span of the last 3 to 24 hours or a custom time span. When you select the custom option, you must specify the From and To date in the MM/DD/YYYY and HH:MM:SS format.

    Number of Top Logs

    Enter the number of top events to be displayed.

    The valid range is 1 to 10, and the default value is 5.

    Schedule

    Report Schedule

    Click Add Schedule.

    Select the type of report schedule to use:

    • Run now—Select this option to schedule and publish the configuration at the current time.

    • Schedule at a later time–Select this option to schedule and publish the configuration at a later time.

    Email Section

    Email Recipients

    Enable this option to send the report to specific recipients in an email.

    • Recipients—Enter or select the e‐mail addresses of the recipients. By default, you can search by first name and select registered users. You can also type in external email addresses.

    • Subject—Enter a subject line containing maximum 2048 characters for the e-mail.

    • Comments—Enter the text containing maximum 2048 to include in the body of the e-mail.

    Note:

    The reports are not sent if a specified recipient does not have permission for a device or domain included in the report configuration when the report is generated.

  4. Click OK to save the report definition.
    A new threat assessment report definition with the defined configurations is created.
Manage Threat Assessment Report Definitions
  • Edit—Select the definition, and then click .

  • Clone—Select the definition, and then click More > Clone.

  • Delete—Select the definition, and then click .

footer-navigation