Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 118

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

110
U
D
SING THE
EPLOYMENT
Step 5
Step 6
Step 7
Configuring an Event
Processor
Step 1
Step 2
E
DITOR
Enter values for the parameters:
Table 5-16 Event Collector Advanced Parameters
Parameter
Receives Flow Context Specifies the first Event Collector installed in your
Auto Detection
Enabled
Click Save.
The deployment editor appears.
Repeat for all Event Collectors in your deployment you wish to configure.
The Event Processor processes flows collected from one or more Event
Collector(s).
To configure an Event Processor:
From either the Event View or System View, select the Event Processor you wish
to configure.
From the menu, select Actions > Configure.
Note: You can also use the right mouse button (right-click) to access the Action
menu items.
The Event Processor Configuration window appears.
STRM Administration Guide
Description
deployment. This parameter is for informational purposes
only and is not amendable.
Specify if you wish the Event Collector to auto analyze and
accept traffic from previously unknown sensor devices. The
default is true, which means that the Event Collector detects
sensor devices in your network. Also, when set to True, the
appropriate firewall ports are opened to enable auto
detection to receive events. For more information on
configuring sensor devices, see the Managing Sensor
Devices Guide.

Advertisement

Table of Contents
loading

Table of Contents