Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 15

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

Table 1-3 Logged Actions
Category
Protocol Configuration
Flow Sources
Offense Manager
TNC Recommendations
Syslog Forwarding
Reports
Groups
Backup and Recovery
STRM Administration Guide
Action
Adding a protocol configuration
Deleting a protocol configuration
Editing a protocol configuration
Adding a flow source
Editing a flow source
Deleting a flow source
Hiding an offense
Closing an offense
Closing all offenses
Creating a recommendation
Editing a recommendation
Deleting a recommendation
Adding a syslog forwarding
Deleting a syslog forwarding
Editing a syslog forwarding
Adding a template
Deleting a template
Editing a template
Executing a template
Deleting a report
Adding a group
Deleting a group
Editing a group
Editing the configuration
Initiating the backup
Completing the backup
Failing the backup
Deleting the backup
Synchronizing the backup
Cancelling the backup
Initiating the restore
Uploading a backup
Uploading an invalid backup
Deleting the backup
Viewing STRM Audit Logs
7

Advertisement

Table of Contents
loading

Table of Contents