Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1 Manual page 54

Managing vulnerability assessment
Table of Contents

Advertisement

52
V
A
P
IEWING
SSET
ROFILE
Step 3
I
NFORMATION
Table 11-2 Asset Profile Window
Parameter
Name
Description
IP Address
Operating System
Host Name (DNS Name) Specifies the IP address or DNS name of the asset.
Asset Weight
VA Risk Level
How Threatening
How Threatened
MAC
Machine Name
User
Extra Data
Host Name
User Group
To view port information, click Ports. This is the default display for assets.
Table 11-3 Ports Information
Parameter
Port
OSVDB ID
Name
Description
Risk/Severity
Managing Vulnerability Assessment
Description
Specify a name you wish to associate with this asset
profile.
Specify a description that you wish to associate with this
asset profile.
Specifies the IP address of the asset.
Specifies the operating system running on the asset.
Using the drop-down list box, specify the level of
importance you wish to associate with this asset. The
range is 0 (not valuable) to 10 (very valuable).
Specifies the vulnerability assessment risk level (0 to 10)
for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Specifies the threat level (0 to 10) posed by the asset
where 0 is the lowest and 10 is the highest. This is a
weighted value against all other hosts in your deployment.
Specifies the threat level (0 to 10) to the asset where 0 is
the lowest and 10 is the highest. This is a weighted value
against all other hosts in your deployment.
Specifies the MAC address of the asset.
Specifies the name of the asset system.
Specifies the last user associated with this asset.
Specifies any additional information associated with this
asset.
Specifies the host name of this asset.
Specifies the user group associated with this asset.
Description
Specifies the port number for the services discovered
running on the asset.
Specifies the vulnerability identifier for the asset. Click the
ID to obtain more information.
Specifies the name of the detected vulnerability. This value
is only available when integrating with VA tools.
Specifies a description of the detected vulnerability. This
value is only available when integrating with VA tools.
Specifies the risk level for the vulnerability.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents