Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1 Manual page 55

Managing vulnerability assessment
Table of Contents

Advertisement

Table 11-3 Ports Information (continued)
Parameter
Last Seen
First Seen
To view History information, click History.
Step 4
Table 11-4 History Information
Parameter
MAC
Host Name
Machine Name
User
User Group
Extra Data
Last Observed
Click Save Changes.
Step 5
Click Close Window.
Step 6
Managing Vulnerability Assessment
Description
Specifies the date and time that the service was last
detected running on the asset both either passively or
actively.
Specifies the date and time when the service was first
detected running on the asset both either passively or
actively.
Description
Specifies the MAC address for this asset. If unknown, this
field is blank.
Specifies the host name of this asset. If unknown, this field
is blank.
Specifies the machine name of this asset. If unknown, this
field is blank.
Specifies the user for this asset. If unknown, this field is
blank.
Specifies the user group for this asset. If unknown, this
field is blank.
Specifies any extra information for this asset. If the text for
this field is greater than 50 characters, click the text to view
the full text in a separate window.
Specifies the last time data was recorded for this asset.
53

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents