Configuring System Settings - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Step 4
Step 5
Step 6
Configuring
System Settings
Step 1
Step 2
Step 3
In the Frequency list box, select the frequency of the updates in the Frequency list
box:
Daily - Updates are downloaded every day at 1 am.
Weekly - Updates are downloaded every Sunday at 1 am.
Monthly - Updates are downloaded on the first day of every month at 1 am.
Click Save save your settings or click Save and Update Now to initiate the update
process immediately.
From the menu, select Configurations > Deploy Configuration Changes.
The updates are enforced through your deployment.
Note: STRM automatic updates are not enforced through your deployment
automatically. After each automatic update, you must log in to STRM and from the
Administration Console menu, select Configurations > Deploy Configuration
Changes.
Using the Administration Console, you can configure the system, database, and
sentry settings.
To configure system settings:
In the Administration Console, click the System Configuration tab.
The System Configuration panel appears.
Click the System Settings icon.
The System Management window appears.
Enter values for the parameters:
Table 3-3 System Settings Parameters
Parameter
Settings
Administrative Email
Address
Alert Email From Address Specify the e-mail address from which you wish to receive
Delete Root Mail
Temporary Files
Retention Period
STRM Log Management Administration Guide
Description
Specify the e-mail address of the designated system
administrator. The default is root@localhost.
e-mail alerts.
Root mail is the default location for host context
messages. Specify one of the following:
Yes - Delete the local administrator e-mail. This is the
default.
No - Do not delete local administrator e-mail.
Specify the time period the system stores temporary files.
The default is 6 hours.

Configuring System Settings

27

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents