Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Manuals
Manuals and User Guides for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1. We have
4
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 manuals available for free PDF download: Manual, Administration Manual
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Manual (246 pages)
Brand:
Juniper
| Category:
Software
| Size: 3.29 MB
Table of Contents
Table of Contents
3
Conventions
7
Technical Documentation
7
Dashboard
10
Offense Manager
11
Event Viewer
11
Flow Viewer
12
Assets
12
Network Surveillance
14
Reports
15
Using STRM
15
Sorting Results
15
Refreshing the Interface
16
Pausing the Interface
16
Investigating IP Addresses
16
Viewing STRM Time
17
Accessing On-Line Help
17
Using the Dashboard
21
Traffic
22
Network Surveillance
22
Topn
23
Offenses
24
Offense Manager
24
Attackers and Targets
25
Categories
25
Event Viewer
26
Events over Time
26
Events by Severity
26
Top Devices
27
Reports
28
Enterprise Security State
28
Enterprise Vulnerability State
29
System Summary
30
Adding Items
30
Using the Network Surveillance Menu Global Views
31
Asset Map
32
Bookmarks
33
QRL Options
33
Viewing Network Activity
34
Interpreting the Graphs
34
Changing the View
36
Changing Flow Attributes
38
Changing Traffic Location
39
Investigating Traffic Using Topn Viewing the Topn Information
40
Investigating Traffic
41
Investigating Flows
42
About Sentries
46
Types of Sentries
46
Viewing Sentries
48
Creating a Sentry
49
Creating an Anomaly Sentry
62
Creating a Threshold Sentry
67
Creating a Custom Sentry
72
Editing a Sentry
78
Using the Offense Manager
84
Managing My Offenses
84
Managing Offenses
85
Viewing Offenses
85
Searching Offenses
94
Removing Offenses
96
Assigning Offenses to Users
98
Viewing Offense by Category
99
Managing Offenses by Attacker Viewing Offenses by Attacker
103
Searching Attackers
110
Managing Offenses by Targets
112
Viewing Offenses by Targets
112
Searching Targets
118
Managing Offenses by Networks
120
Viewing Offenses by Networks
120
Searching Networks
130
Marking an Item for Follow-Up
131
Adding Notes
131
Configuring Notification
132
Managing Network Anomalies
133
Viewing Network Anomaly Offenses
133
Closing Offenses
135
Forwarding Network Anomaly Offenses
136
Exporting Offenses
137
Using the Event Viewer Interface
140
Using the Toolbar
140
Using the Right-Click Menu Options
140
Viewing Events
141
Viewing Normalized Events
141
Viewing Raw Events
145
Viewing Aggregate Normalized Events
146
Searching Events
151
Deleting Saved Searches
154
Viewing the Associated Offense
154
Modifying Event Mapping
155
Tuning False Positives
157
Exporting Events
158
Using the Flow Viewer Interface
160
Using the Toolbar
160
Using the Right-Click Menu Options
160
Viewing Flows
161
Viewing Aggregated Flows
164
Using the Search
170
Searching Flows
170
Exporting Flows
173
Deleting Saved Searches
173
Searching Asset Profiles
175
Adding an Asset Profile
181
Editing an Asset
182
Deleting Assets
184
Deleting an Asset
184
Deleting All Assets
184
Importing Asset Profiles
185
Exporting Assets
186
Using the Reports Interface
188
Using the Navigation Menu
188
Using the Toolbar
189
Viewing Reports
189
Grouping Reports
190
Creating a Group
191
Editing a Group
192
Copying a Template to Another Group
192
Deleting a Template from a Group
193
Assigning a Report to a Group
194
Creating a Report
194
Creating a Template
195
Configuring Charts
202
Selecting a Graph Type
220
Using Default Report Templates
222
Generating a Report
223
Duplicating a Report
223
Sharing a Report
224
Branding Your Report
224
Configuring TNC Recommendations
227
Removing TNC Recommendations
229
Advertisement
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Manual (130 pages)
STRM Log Management Users Guide
Brand:
Juniper
| Category:
Software
| Size: 1.62 MB
Table of Contents
Table of Contents
3
Bout His Uide
7
Conventions
7
Technical Documentation
7
Contacting Customer Support
8
1 About Strm Log Management Slim
9
Logging in to STRM Log Management
9
Dashboard
10
Event Viewer
11
Reports
11
Using STRM Log Management
12
Sorting Results
12
Refreshing the Interface
12
Pausing the Interface
12
Investigating IP Addresses
12
STRM Log Management Time
13
Accessing On-Line Help
13
STRM Log Management Administration Console
14
2 Sing the Ashboard
15
About the Dashboard
15
Using the Dashboard
16
Event Viewer
16
Events over Time
16
Events by Severity
17
Top Devices
17
Reports
18
System Summary
18
Adding Items
19
3 Using the Event Viewer
21
Using the Event Viewer Interface
22
Using the Toolbar
22
Using the Right-Click Menu Options
22
Viewing Events
23
Viewing Normalized Events
23
Viewing Raw Events
26
Viewing Aggregate Normalized Events
27
Using the Search
33
Searching Events
33
Deleting Saved Searches
36
Modifying Event Mapping
37
Exporting Events
39
4 Configuring Rules
41
Viewing Rules
42
Enabling/Disabling Rules
43
Creating a Rule
43
Event Rule Tests
53
Copying a Rule
58
Deleting a Rule
59
Grouping Rules
59
Viewing Groups
59
Creating a Group
60
Editing a Group
61
Copying an Item to Another Group(S)
62
Deleting an Item from a Group
63
Assigning an Item to a Group
64
Editing Building Blocks
64
5 Managing Reports
67
Using Default Report Templates Generating a Report
67
Using the Reports Interface
68
Using the Navigation Menu
68
Using the Toolbar
69
Viewing Reports
69
Grouping Reports
70
Creating a Group
71
Copying a Template to Another Group
71
Editing a Group
72
Deleting a Template from a Group
73
Assigning a Report to a Group
74
Creating a Report
74
Creating a Template
75
Configuring Charts
82
Selecting a Graph Type
91
Using Default Report Templates
92
Duplicating a Report
93
Generating a Report
93
Branding Your Report
94
Sharing a Report
94
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual (92 pages)
STRM Log Management Administration Guide
Brand:
Juniper
| Category:
Software
| Size: 1.14 MB
Table of Contents
Table of Contents
3
Bout His Uide
7
Audience
7
Conventions
7
Technical Documentation
7
Contacting Customer Support
8
1 Overview
9
About the Interface
9
Accessing the Administration Console
10
Using the Interface
10
Deploying Changes
11
Viewing STRM Log Management Audit Logs
11
Logged Actions
12
Viewing the Log File
13
2 Managing Users
15
Managing Roles
15
Creating a Role
15
Editing a Role
17
Managing User Accounts
18
Creating a User Account
18
Editing a User Account
19
Disabling a User Account
20
Authenticating Users
21
3 Setting U Pstrm Log Management
25
Managing Your License Keys
25
Updating Your License Key
26
Exporting Your License Key Information
27
Creating Your Network Hierarchy
28
Considerations
28
Defining Your Network Hierarchy
29
Scheduling Automatic Updates
32
Configuring System Settings
33
Configuring System Notifications
37
Configuring the Console Settings
39
Starting and Stopping STRM Log Management
41
Accessing the Embedded SNMP Agent
41
Configuring Access Settings
42
Configuring Firewall Access
42
Updating Your Host Set-Up
44
Configuring Interface Roles
45
Changing Passwords
46
Updating System Time
46
4 Managing Backup and Recovery
51
Managing Backup Archives
51
Viewing Back up Archives
51
Importing an Archive
52
Deleting a Backup Archive
53
Backing up Your Information
54
Scheduling Your Backup
54
Initiating a Backup
55
Restoring Your Configuration Information
56
5 Using the Deployment Editor
59
About the Deployment Editor
60
Accessing the Deployment Editor
61
Using the Editor
61
Creating Your Deployment
63
Before You Begin
63
Editing Deployment Editor Preferences
64
Building Your Event View
64
Adding Components
65
Connecting Components
66
Forwarding Normalized Events
67
Renaming Components
69
Managing Your System View
69
Setting up Managed Hosts
70
Using NAT with STRM Log Management
74
Configuring a Managed Host
78
Assigning a Component to a Host
78
Configuring Host Context
79
Configuring STRM Log Management Components
82
Configuring an Event Collector
82
Configuring an Event Processor
83
6 Forwarding Syslog Data
85
Adding a Syslog Destination
85
Editing a Syslog Destination
86
Delete a Syslog Destination
87
Advertisement
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Manual (36 pages)
Managing Sensor Devices
Brand:
Juniper
| Category:
Software
| Size: 0.6 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Audience
5
Technical Documentation
5
Contacting Customer Support
6
1 Anaging Ensor Evices
7
Configuring STRM Log Management to Receive Events
7
Managing Sensor Devices
8
Adding a Sensor Device
8
Editing Sensor Devices
10
Enabling/Disabling Sensor Devices
13
Deleting a Sensor Device
13
Configuring Protocols
14
Adding a Protocol
14
Editing a Protocol
21
Deleting a Protocol
21
Grouping Sensor Devices
22
Viewing Sensor Devices Using Groups
22
Creating a Group
22
Editing a Group
23
Copying a Sensor Device to Another Group
24
Removing a Sensor Device from a Group
24
2 Creating a Device Extension
27
About Device Extensions
27
Creating a Device Extension Document
28
Viewing Device Extensions
28
Adding a Device Extension
29
Editing a Device Extension
31
Copying a Device Extension
32
Deleting a Device Extension
33
Enabling/Disabling a Device Extension
34
Reporting a Device Extension
34
Advertisement
Related Products
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - AQL EVENT AND FLOW QUERY CLI GUIDE
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - EVENT CATEGORY CORRELATION REV 1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - SNMP AGENT GUIDE REV 1
Juniper STRM LOG MANAGEMENT 2008.2 - S 6-2008
Juniper NETWORK AND SECURITY MANAGER 2010.4 - API GUIDE REV 1
Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING J SERIES SERVICES ROUTERS AND SRX SERIES SERVICES GATEWAYS GUIDE REV
Juniper NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Juniper NETWORK AND SECURITY MANAGER 2010.4 - M-SERIES AND MX-SERIES DEVICES GUIDE REV 1
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL