Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1 Manual page 11

Category offense investigation guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1:
Table of Contents

Advertisement

Double-click the offense you wish to view.
Step 5
The details panel appears.
To investigate the attacker, view the Attacker Summary box:
Step 6
Location - Allows you to determine if the attacker is local or remote:
- Local - This field specifies the network (group) in which it is located.
- Remote - This field specifies the geographic location of the attacker, for
example, Asia. We recommend that you investigate the traffic from the
remote source IP address to make sure that your firewalls are probably
configured to block any threatening traffic. If firewall logs are being sent to
Offense Category Investigation Guide
How do I Investigate an Access Offense?
5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents