Creating Your Deployment; Before You Begin - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Creating Your
Deployment
Step 1
Step 2
Step 3
Step 4
Step 5

Before you Begin

Table 5-2 Toolbar Options (continued)
Icon
Description
Zoom in.
Zoom out.
To create your deployment, you must:
Build your System View. See
Configure added components. See
Components.
Build your Event View. See
Stage the deployment. From the deployment editor menu, select File > Save to
Staging.
Deploy all configuration changes. From the Administration Console menu, select
Configurations > Deploy All.
For more information on the Administration Console, see
Before you begin, you must:
Install all necessary hardware and STRM Log Management software.
Install Java Runtime Environment. You can download Java version 1.5.0_12 at
the following web site: http://java.com/en/download/index.jsp
If you are using the Firefox browser, you must configure your browser to accept
Java Network Language Protocol (JNLP) files.
Plan your STRM Log Management deployment including the IP addresses and
login information for all devices in your STRM Log Management deployment.
Note: If you require assistance with the above, please contact Juniper Customer
Support.
STRM Log Management Administration Guide
Managing Your System
Configuring STRM Log Management
Building Your Event
View.
About the Deployment Editor
View.
Chapter 1
Overview.
57

Advertisement

Table of Contents
loading

Table of Contents