Configuring An Event Processor - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

Step 4
Step 5
Step 6
Step 7
Configuring an Event
Processor
Step 1
Step 2
In the toolbar, click Advanced to display the advanced parameters.
The advanced configuration parameter appear.
Enter values for the parameters:
Table 5-5 Event Collector Advanced Parameters
Parameter
Receives Flow Context Specifies the first Event Collector installed in your
Auto Detection
Enabled
Click Save.
The deployment editor appears.
Repeat for all Event Collectors in your deployment you wish to configure.
The Event Processor processes flows collected from one or more Event
Collector(s).
To configure an Event Processor:
From either the Event View or System View, select the Event Processor you wish
to configure.
From the menu, select Actions > Configure.
Note: You can also use the right mouse button (right-click) to access the Action
menu items.
The Event Processor Configuration window appears.
STRM Log Management Administration Guide
Configuring STRM Log Management Components
Description
deployment. This parameter is for informational purposes
only and is not amendable.
Specify if you wish the Event Collector to auto analyze and
accept traffic from previously unknown sensor devices. The
default is true, which means that the Event Collector detects
sensor devices in your network. Also, when set to True, the
appropriate firewall ports are opened to enable auto
detection to receive events. For more information on
configuring sensor devices, see the Managing Sensor
Devices Guide.
77

Advertisement

Table of Contents
loading

Table of Contents