Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 104

Table of Contents

Advertisement

98
I
O
NVESTIGATING
FFENSES
Step 3
The Attacker/Source panel provides the following information:
Table 5-7 Attacker/Source Parameters
Parameter
Description
Follow-up Flag
Specifies action taken on the attacker, for example, if a flag
appears, the attacker is marked for follow-up. Point your mouse
over the icon to display additional information.
Identify
Specifies the IP address of the attacker.
Location
Specifies the network, continent, or country where the attacker is
located.
Magnitude
Specifies the relative importance of the attacker. The magnitude
bar provides a visual representation of all the correlated variables
of the attacker. Variables include the vulnerability assessment
risk and the amount of threat posed.
Point your mouse to the magnitude bar to display values and the
calculated magnitude.
Offenses
Specifies the number of offenses associated to this attacker.
Local
Specifies the number of targets associated to this attacker.
Target(s)/Dest
Events
Specifies the number of events associated to this attacker.
Either double-click the offense you wish to view or, from the toolbar, choose one of
the following options:
STRM Users Guide
Threat Posing - The calculated value for this attacker over
time, that indicates how severe the attacker is compared to all
other attackers in your network.
Vulnerability Risk - The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents