Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 21

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

Table 2-1 Create Roles Parameters (continued)
Parameter
Offense Management
Event Viewer
Asset Management
STRM Administration Guide
Description
Select the check box if you wish to grant this user access to
Offense Manager functionality. Within the Offense Manager
functionality, you can grant additional access to the
following:
Assign Offenses to Users - Select the check box if you
wish to allow users to assign offenses to other users.
Customized Rule Creation - Select the check box if you
wish to allow users to create custom rules.
For more information on the Offense Manager, see the
STRM Users Guide.
Select the check box if you wish this user to have access to
the Event Viewer. Within the Event Viewer, you can also
grant users additional access to the following:
Event Search Restrictions Override - Select the check
box if you wish to allow users the ability to override event
search restrictions.
Customized Rule Creation functionality - Select the
check box if you wish to allow users to create rules using
the Event Viewer.
For more information on the Event Viewer, see the STRM
Users Guide.
Select the check box if you wish to grant this user access to
Asset Management functionality. Within the Asset
Management functionality, you can grant additional access
to the following:
Server Discovery - Select the check box if you wish to
allow users the ability to discover servers.
View VA Data - Select the check box if you wish to allow
users access to vulnerability assessment data.
Perform VA Scans - Select the check box if you wish to
allows users to perform vulnerability assessment scans.
Managing Roles
13

Advertisement

Table of Contents
loading

Table of Contents