Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - MANAGING SENSOR DEVICES REV 1 Manual page 11

Managing sensor devices
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - MANAGING SENSOR DEVICES REV 1:
Table of Contents

Advertisement

Edit values for the parameters, as necessary:
Step 5
Table 1-2 Edit a Sensor Device Parameters
Parameter
Device Name
Protocol Configuration
Device Description
Device Hostname/IP
Credibility
Target Event Collector
Description
Specify the desired name of the device.
Using the drop-down list box, select the protocol you
wish to use for this sensor device. If the device uses
syslog, a default syslog configuration is automatically
applied. For more information on configuring protocols,
Adding a Protocol
see
Specify a description for the sensor device (optional).
Specify the hostname or IP address for the device.
Specify the credibility of the device. The range is from 0
to 10. The credibility indicates the integrity of an event
or offense as determined by the credibility rating from
source devices. Credibility increases as the multiple
sources report the same event. The default is 5.
Using the drop-down list box, select the Event Collector
you wish to use as the target for this device.
Managing Sensor Devices Guide
Managing Sensor Devices
.
7

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents