Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 Administration Manual page 370

Strm administration guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2:
Table of Contents

Advertisement

362
I
NDEX
SIM
reset 41
SNMP
embedded SNMP agent settings 35
SNMP agent
accessing 42
SNMP settings 35
source
,
,
,
off-site 70
71
77
78
starting QRadar 41
stopping QRadar 41
storage 107
storage location
asset profile 33
device log 33
flow data 33
store event payload 32
,
superflows 98
101
syslog
forwarding 219
adding 219
deleting 221
editing 220
system authentication 18
system settings 31
configuring 31
system thresholds 36
system time 48
system view
about 62
adding a host 82
assigning components 91
Host Context 92
managed host 91
managing 80
T
TACACS authentication 18
target
,
,
,
off-site 70
71
77
78
templates 126
enterprise 237
ISP 325
university 281
temporary files retention period 31
tests
about 175
thresholds 36
time 48
time limit
command like execution 33
reporting execution 33
web execution 33
TNC recommendation 31
U
university template 281
Update Daemon
configuring 106
user
authentication 18
creating account 15
editing account 17
managing 11
roles 11
user accounts
managing 15
user data files 32
V
views
applications object
editing 149
Applications View 146
adding 147
best practices 174
Custom Views 161
defining unique groups and objects 141
enable and disable 172
ports 142
ports object
adding 142
editing 144
Ports View 142
QFlow Collector object
adding 158
QFlow Collectors 158
Remote Networks 151
Remote Networks object
adding 151
editing 153
Remote Services 154
Remote Services object
adding 155
editing 156
VIS passive host profile interval 31
STRM Administration Guide

Advertisement

Table of Contents
loading

Table of Contents