Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1 Administration Manual page 91

Strm log management administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1:
Table of Contents

Advertisement

I
NDEX
A
administration console
about 3
accessing 4
using 4
administrator role 10
Ariel database 78
audience 1
audit log
viewing 7
audit logs 5
authentication
configuring 15
LDAP 15
RADIUS 15
system 15
TACACS 15
user 15
auto detection 77
automatic update
about 26
scheduling 26
B
backup and recovery 45
C
changes
deploying 5
command line max matched results 28
components 76
console
settings 33
conventions 1
customer support
contacting 2
D
database settings 28
deploying changes 5
deployment editor 53
about 53
accessing 55
creating your deployment 57
event view 58
preferences 58
STRM Log Management components 76
requirements 57
system view 63
toolbar 56
STRM Log Management Administration Guide
using 55
device access 36
device management 39
E
,
,
encryption 60
61
63
Event Collector
about 58
configuring 76
Event Processor
about 58
configuring 77
event view
about 54
adding components 59
building 58
connecting components 60
renaming components 63
F
firewall access 36
flow view
components 61
H
hashing
algorithm 29
host
adding 65
,
host context 54
73
I
interface roles 39
L
LDAP/Active directory 15
license key
exporting 21
managing 19
logs 5
M
managed host
adding 65
assigning components 72
editing 66

Advertisement

Table of Contents
loading

Table of Contents