Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1 Manual page 80

Configuring dsms
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CONFIGURING DSMS REV 1:
Table of Contents

Advertisement

74
IBM AIX 5L
You are now ready to configure the sensor device within the STRM interface. To
configure STRM to receive events from an IBM AIX 5L server, you must select the
IBM AIX Server option from the Sensor Device Type drop-down list box. For more
information on configuring sensor devices, see the Managing Sensor Devices
Guide.
See your authorization server manufacturer for configuration information.
Configuring DSMs Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents