Jneid,
You should not turn on all the screens blindly. First you need to assess which network threats are really critical, tune their screen related parameters and then finall enable them.
If you are still interested in using all of them, use them with alarm-without-drop parameter to ensure services are not affected. Then analyze the logs and decide which one you want to keep. However, it is a hard way of doing 🙂
Moreover, default screen pre-configured on every SRX box is a good start point to achieve minimum security.
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
set security screen ids-option untrust-screen tcp syn-flood queue-size 2000
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security zones security-zone untrust screen untrust-screen
You can apply this screen (untrust-screen) on any zone.
set security zones security-zone <zone-name> screen untrust-screen
Regards