Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
Security Threat Response Manager
Juniper Security Threat Response Manager Manuals
Manuals and User Guides for Juniper Security Threat Response Manager. We have
11
Juniper Security Threat Response Manager manuals available for free PDF download: Manual, Reference Manual, Installation Manual, Getting Started
Juniper Security Threat Response Manager Manual (228 pages)
Configuring DSMs
Brand:
Juniper
| Category:
Software
| Size: 1.06 MB
Table of Contents
Table of Contents
3
Ambiron Trustwave Ipangel
13
Apache HTTP Server
15
F5 Networks Bigip
21
Blue Coat SG
23
Check Point Firewall-1
25
Check Point Provider-1
31
Cisco ACS
35
Cisco ASA
37
Cisco Catos for Catalyst Switches
39
Cisco CSA
41
Cisco FWSM
43
Cisco IDS/IPS
45
Cisco NAC Device
47
Cisco IOS
49
Cisco Pix
51
Cisco VPN 3000 Concentrator
53
Cyberguard Firewall/Vpn Appliance
55
Enterasys Dragon
57
Enterasys Matrix Router
61
Enterasys Matrix N-Series
63
Forescout Counteract
67
Fortinet Fortigate
69
Generic Authorization Server
71
Generic Firewall
75
IBM Proventia Management Siteprotector
81
ISS Proventia
83
Juniper DX Application Acceleration Platform
85
Juniper EX-Series Ethernet Switch
87
Juniper Netscreen IDP
89
Juniper Networks Secure Access
91
Juniper Infranet Controller
95
Juniper Netscreen Firewall
99
Juniper NSM
99
Juniper Router
101
Linux DHCP
105
Linux Iptables
107
Linux Login Messages
109
Mcafee Intrushield
111
Mcafee Epolicy Orchestrator
113
Metainfo Metaip
115
Microsoft Exchange Server
117
Microsoft DHCP Server
119
Microsoft IAS Server
121
Microsoft SQL Server
125
Microsoft Windows Security Event Log
127
Niksun
129
Nokia Firewall
131
Nortel ARN
135
Nortel Application Switch
137
Nortel Contivity Firewall/Vpn
139
Nortel VPN Gateway
151
Openbsd
153
Open Source SNORT
155
Oracle DB Listener
161
Proftpd
165
Samhain
167
Sun Solaris
173
Sun Solaris DHCP
175
Sonicwall
177
Sun Solaris Sendmail
179
Sourcefire Intrusion Sensor
181
Squid Web Proxy
183
Symantec SGS
185
Symantec System Center
187
Symark Powerbroker
189
Tipping Point Intrusion Prevention System
191
Tippingpoint X505/X506 Device
193
Toplayer
195
Trend Micro Interscan Viruswall
197
Tripwire
199
Universal DSM
201
Vericept Content 360 DSM
213
Supported Dsms
215
Array Network SSL VPN
216
Extreme Networks Extremeware
219
Oracle Audit Records
224
Advertisement
Juniper Security Threat Response Manager Manual (94 pages)
Category Offense Investigation Guide
Brand:
Juniper
| Category:
Software
| Size: 1.61 MB
Table of Contents
Table of Contents
3
About this Guide
7
Documentation Feedback
7
Requesting Support
7
1 Access Offenses
9
What Is an Access Offense
9
How Do I Investigate an Access Offense
10
How Do I Tune an Access Offense
13
2 Sim Audit Offenses
15
What Is SIM Audit
15
How Do I Investigate a SIM Audit Offense
15
How Do I Tune a SIM Audit Offense
18
Tuning Using False Positive Function
18
Tuning Using Custom Rules Wizard
20
3 Authentication Offenses
23
What Is an Authentication Offense
23
How Do I Investigate an Authentication Offense
23
How Do I Tune an Authentication Offense
27
4 Cre Offenses
29
What Is a CRE Offense
29
How Do I Investigate a CRE Offense
29
How Do I Tune a CRE Offense
32
5 Denial of Service (D O S) Offenses
33
What Is a Dos Offense
33
What Is a Dos Flood Attack
33
What Is a Dos Service Exploit
34
How Do I Investigate a Dos Offense
34
How Do I Tune a Dos Offense
38
Tuning Using False Positive Function
38
Tuning Using Sentries
39
Tuning Using Custom Rules Wizard
39
How Can I Verify if STRM Is Receiving Valid Dos Offenses
40
6 Exploit Offenses
41
What Is an Exploit Attack
41
How Do I Investigate an Exploit Offense
41
How Do I Tune an Exploit Offenses
45
How Can I Verify that STRM Is Receiving Valid Exploit Offenses
46
7 Malware Offenses
47
What Is Malware
47
What Is a Malware Offense
47
How Do I Investigate a Malware Offense? How Do I Tune a Malware Offense
47
8 Network Anomalies Offenses
53
What Is an Network Anomaly Offense
53
Policy
53
Threshold
53
Anomaly
54
Behavior
54
How Do I Investigate a Network Anomaly Offense
54
How Do I Tune a Network Anomaly Offense
56
9 Policy Offenses
57
What Is a Policy Offense
57
How Do I Investigate a Policy Offense
57
How Do I Tune a Policy Offense
60
Tuning Using False Positive Function
60
Tuning Using Custom Rules Wizard
61
How Can I Verify that STRM Is Receiving Valid Offenses
61
10 Potential Exploit Offenses
63
What Is a Potential Exploit Offense
63
How Do I Investigate a Potential Exploit Offense
63
How Do I Tune a Potential Exploit Offense
65
11 Reconnaissance Offenses
67
What Is Reconnaissance
67
What Is Network Reconnaissance
67
What Is a Reconnaissances Offense
67
How Do I Investigate a Reconnaissance Offense
68
How Do I Tune a Reconnaissance Offense
71
Tuning Using False Positive Function
71
Tuning Using Custom Rules Wizard
73
12 Suspicious Activity Offenses
75
What Is a Suspicious Attack
75
What Is Suspicious Traffic
75
What Is a Suspicious Offense
75
How Do I Investigate Suspicious Offense
76
How Do I Tune a Suspicious Offenses
79
13 System Offenses
83
What Is a System Offense
83
How Do I Investigate a System Offense
83
How Do I Tune a System Offense
86
How Can I Verify that STRM Is Receiving Valid Offenses
87
14 User Defined Offenses
89
What Is a User Defined Offense
89
How Do I Investigate a User Defined Offense
89
How Do I Tune a User Defined Offense
92
Juniper Security Threat Response Manager Manual (68 pages)
SNMP Agent Guide
Brand:
Juniper
| Category:
Software
| Size: 2.77 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Technical Documentation
5
Documentation Feedback
5
Requesting Support
6
1 About the Embedded Snmp Agent
7
About the SNMP Agent
7
Accessing the SNMP Agent
7
2 Using the Snmp-Linux -Mib
9
Processor Details
9
Disk Space Details
9
Mount Details
9
System Performance Details
9
Processes Table Details
12
Processor Performance Details
12
Page Details
13
Service Details
13
Boot Log Details
14
Cron Log Details
15
Secure Log Details
15
IDE Details
16
Module Details
16
PCI Details
17
SCSI Details
18
Slab Details
18
3 Urfc1213-Mib
21
System Details
21
Interfaces
21
Address Translation
21
IP Details
21
System Details
28
IP Address Table Details
29
IP Route Table Details
30
IP Net to Media Table Details
32
ICMP Table Details
33
TCP Details
35
TCP Connection Details
37
UDP Details
38
UDP Table Details
38
SNMP Details
39
4 Using the Host -Resources -Mib
43
System Details
43
Storage Details
43
Device Details
43
Processor Table Details
43
Network Table Details
43
Printer Table Details
43
Disk Storage Details
43
Partition Details
43
File System Details
43
Snmp Overview
55
About SNMP
55
What Is an Agent
55
Who Is a Manager
56
Manager and Agent Relationship
56
What Is a MIB (Management Information Base)
57
What Are MIB Groups
58
MIB Data Types Available
59
MIB Constructs Available
62
Supported Textual Conventions
63
Nodes
64
Object Identifiers
64
Relative and Absolute Object Identifiers
64
Specifying Object Identifiers Symbolically
64
Object Identifier with Instance Indexes
64
Scalar and Tabular Objects
65
How an Agent Works
66
Traps
66
Specifying SNMP Variables in GET Requests
67
Advertisement
Juniper Security Threat Response Manager Manual (74 pages)
STRM Adaptive Log Exporter
Brand:
Juniper
| Category:
Software
| Size: 0.81 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Technical Documentation
5
Documentation Feedback
5
Requesting Support
6
Overview
7
Integrating Device Support Modules (Dsms) with STRM
7
Using the Adaptive Log Exporter
8
Using the Menu
8
Using the Toolbar
8
Deploying Changes
9
Installing the Adaptive Log Exporter
11
Before You Begin
11
Un-Installing the Adaptive Log Exporter
15
Using the Preferences Window
17
Managing Updates
18
Configuring Adaptive Log Exporter Updates
18
Scheduling Automatic Updates
21
Configuring the Update Site
23
Configuring Updates for Off-Line Sites
24
Managing Devices
27
Installing Device Types
27
Updating Devices
29
Configuring Devices
31
Adding a Device
31
Editing a Device
33
Deleting a Device
34
Managing Destinations
37
Configuring Destinations
37
Adding a Destination
37
Editing a Destination
39
Deleting a Destination
41
Mapping to a Destination
42
Creating a Mapping
42
Removing a Mapping
43
Configuring the Cisco ACS Device
45
Configuring the Cisco CSA Device
47
Configuring the File Forwarder Device
49
Configuring the Juniper SBR Device
51
Configuring the Windows Event Log Device
53
Configuring the Microsoft DHCP Device
55
Configuring the Trend Micro Interscan Viruswall Device
57
Configuring the Microsoft Exchange Server Device
59
Forwarding OWA Logs
59
Forwarding SMTP Logs
60
Configuring the Microsoft SQL Server Device
61
Configuring the Microsoft IIS Device
63
Collecting Windows Event Logs
65
Collecting Logs Without an Agent
66
Configuring the Adaptive Log Exporter
67
Collecting Logs with an Agent
69
Configuring the Adaptive Log Exporter
70
Configuring STRM to Accept Logs
73
Juniper Security Threat Response Manager Manual (58 pages)
Managing Vulnerability Assessment
Brand:
Juniper
| Category:
Software
| Size: 0.45 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Technical Documentation
5
Documentation Feedback
5
Requesting Support
6
1 Overview
7
Configuring Vulnerability Assessment
7
Viewing Scanners
7
2 MANAGING Ip360 SCANNERS
11
Adding an Ip360 Scanner
11
Editing an Ip360 Scanner
11
Deleting an Ip360 Scanner
11
Exporting Reports
14
3 Managing Nessus Scanners
15
Adding a Nessus Scanner
15
Editing an Nessus Scanner
15
Deleting a Nessus Scanner
15
4 Managing Nessus Scan Result Importers
19
Adding a Nessus Scan Result Importer
19
Editing a Nessus Scan Result Importer
19
Deleting a Nessus Scan Result Importer
19
5 Managing Nmap Scanners
23
Adding a Nmap Scanner
23
Editing an Nmap Scanner
23
Deleting an Nmap Scanner
23
6 Managing Qualys Scanners
27
Adding a Qualys Scanner
27
Editing a Qualys Scanner
27
Deleting a Qualys Scanner
27
Adding a Foundscan Scanner
31
Editing a Foundscan Scanner
34
Deleting a Foundscan Scanner
34
Importing Custom Certificates
34
Example of Trustedca.pem File
36
Example of Portal.pem File
36
Adding a Juniper NSM Profiler Scanner
41
Editing a Profiler Scanner
43
Deleting a Profiler Scanner
43
Adding a Rapid7 Nexpose Scanner
45
Editing a Rapid7 Nexpose Scanner
47
Deleting a Rapid7 Nexpose Scanner
47
Scheduling a Scan
49
Editing a Scan Schedule
51
Deleting a Scheduled Scan
52
Juniper Security Threat Response Manager Reference Manual (50 pages)
Event Category Correlation Reference Guide
Brand:
Juniper
| Category:
Software
| Size: 0.57 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Technical Documentation
5
Documentation Feedback
5
Requesting Support
6
Event Category Correlation
7
About Event Category Correlation
7
High-Level Event Categories
8
Event Correlation Processing
8
Additional Event Processing
8
Recon
9
Dos
9
Authentication
9
Access
9
Exploit
9
Malware
9
Suspicious Activity
32
System
36
Policy
39
Cre
40
Potential Exploit
40
SIM Audit
41
VIS Host Discovery
42
Application
42
Juniper Security Threat Response Manager Installation Manual (40 pages)
Brand:
Juniper
| Category:
Software
| Size: 0.63 MB
Table of Contents
Table of Contents
3
Bout His Uide
5
Conventions
5
Technical Documentation
5
Contacting Customer Support
5
1 Preparing for Your Installation
7
Deploying STRM
7
Additional Hardware Requirements
9
Additional Software Requirements
9
Browser Support
9
Preparing Your Network Hierarchy
9
Identifying Network Settings
10
Identifying Security Monitoring Devices and Flow Data Sources
11
Identifying Network Assets
12
2 Installing Strm
15
Setting up Appliances
15
Installing STRM Using Red hat Enterprise
19
Installing Japanese Support
24
Accessing STRM
25
A Setting U P Red hat Enterprise
27
Before You Begin
27
Configuring Network Parameters
28
Configuring Firewall Configuration
28
Configuring Disk Partitions
28
Update 6
28
Installing Red hat Enterprise
29
Customizing Red hat Upgrades
30
Hanging Etwork Ettings
31
Changing Network Settings in an All-In-One Console
31
Changing the Network Settings of a Console in a Multi-System Deployment
31
Changing the Network Settings of a Non-Console in a Multi-System Deployment
31
Juniper Security Threat Response Manager Manual (36 pages)
Managing Sensor Devices
Brand:
Juniper
| Category:
Software
| Size: 0.6 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Audience
5
Technical Documentation
5
Contacting Customer Support
6
1 Anaging Ensor Evices
7
Configuring STRM Log Management to Receive Events
7
Managing Sensor Devices
8
Adding a Sensor Device
8
Editing Sensor Devices
10
Enabling/Disabling Sensor Devices
13
Deleting a Sensor Device
13
Configuring Protocols
14
Adding a Protocol
14
Editing a Protocol
21
Deleting a Protocol
21
Grouping Sensor Devices
22
Viewing Sensor Devices Using Groups
22
Creating a Group
22
Editing a Group
23
Copying a Sensor Device to Another Group
24
Removing a Sensor Device from a Group
24
2 Creating a Device Extension
27
About Device Extensions
27
Creating a Device Extension Document
28
Viewing Device Extensions
28
Adding a Device Extension
29
Editing a Device Extension
31
Copying a Device Extension
32
Deleting a Device Extension
33
Enabling/Disabling a Device Extension
34
Reporting a Device Extension
34
Juniper Security Threat Response Manager Manual (18 pages)
AQL Event and Flow Query CLI Guide
Brand:
Juniper
| Category:
Software
| Size: 0.12 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Technical Documentation
5
Documentation Feedback
5
Requesting Support
6
Using the Aql Query Cli
7
About the AQL Query CLI
7
Accessing the AQL Query CLI
8
Using a Select Statement
9
Using Where Clauses
12
Using the Group by Clause
12
Using the Order by Clause
13
Using the Count(*) Clause
14
Using the Distinct Clause
14
Using the Count (Distinct
14
Using the Materialize View Clause
15
Using the Like Clause
15
Using the Describe Statement
16
Juniper Security Threat Response Manager Getting Started (10 pages)
Getting Started with STRM Log Management Appliances
Brand:
Juniper
| Category:
Software
| Size: 1.06 MB
Table of Contents
Connect to External Devices
5
Connect to the Network
5
Connect to Power Source
5
Configure Time Zone
7
Configure Passwords
8
Finish Installation
8
Juniper Security Threat Response Manager Getting Started (14 pages)
Getting Started With STRM Appliances
Brand:
Juniper
| Category:
Software
| Size: 1.92 MB
Advertisement
Related Products
Juniper SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - INSTALLATION REV1
Juniper SECURITY THREAT RESPONSE MANAGER - APPLICATION CONFIGURATION GUIDE REV 1
Juniper SECURITY THREAT RESPONSE MANAGER - SOFTWARE INSTALLATION REV 1
Juniper TePM Agent
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - AQL EVENT AND FLOW QUERY CLI GUIDE
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - EVENT CATEGORY CORRELATION REV 1
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL