Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 7

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

Conventions
Technical
Documentation
Documentation
Feedback
A
T
BOUT
HIS
The Configuring DSMs Guide provides you with information for configuring sensor
devices (DSMs) and integrating the DSMs with STRM or STRM Log Management.
Table 1
lists conventions that are used throughout this guide.
Table 1 Icons
Icon
Type
Information note
Caution
Warning
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
http://
www.juniper.net/support
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
techpubs-comments@juniper.net
http://www.juniper.net/techpubs/docbug/docbugreport.html
sure to include the following information with your comments:
Document name
Document part number
Page number
Software release version
Configuring DSMs
G
UIDE
Description
Information that describes important features or
instructions.
Information that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
Information that alerts you to potential personal
injury.
/.
, or fill out the documentation feedback form at
. If you are using e-mail, be

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents