Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 102

Table of Contents

Advertisement

96
I
O
NVESTIGATING
FFENSES
Step 3
Step 4
Table 5-6 By Category Window Parameters (continued)
Parameter
Description
For more information on category offenses, see the Category
Offense Investigation Guide.
Offense Count
Specifies the number of active offenses (offenses that have not
been hidden or closed) in the specified category.
Local Target
Specifies the number of local targets associated with this offense
Count
in this category.
For network anomaly offenses, this value is 0 since these counts
are not relevant to the network anomaly category.
Attacker Count
Specifies the number of attackers associated with offenses in this
category. For example, even if an attacker is associated with
offenses in five different low-level categories, the attacker is only
counted once.
For network anomaly offenses, this value is 0 since these counts
are not relevant to the network anomaly category.
Event Count
Specifies the number of active events (events that are not closed
or hidden) associated with this offense in the specified category.
First Offense
Specifies the date and time of the occurrence of the first offense
in this category.
Last Updated
Specifies the date and time of the occurrence of the last offense
in the specified category.
Note: All counts above do not consider any network permissions of the user.
To view additional low-level category information for a particular category, click the
arrow icon next to the category name.
Offense information appears for each low-level category. For information on
viewing Network Anomalies category information, see
Anomalies.
To view detailed offense information, double-click any low-level category to view
the list of associated offenses.
The list of offenses appear.
STRM Users Guide
System - Events related to system changes, software
installation, or status messages.
User Defined- Events related to custom rules.
VIS Host Discovery - Events related to Vulnerability
Assessment Integration Server (VIS) host discovery.
Managing Network

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents