Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 106

Table of Contents

Advertisement

100
I
O
NVESTIGATING
FFENSES
Step 4
Table 5-9 Attacker Details Panel (continued)
Parameter
Description
Location
Specifies the location of the attacker.
Offense(s)
Specifies the names of the offenses associated with this
attacker. To view additional information on the offense, click the
name or term that appears.
Local
Specifies the local target of the offense. To view additional
Target(s)/Dest
information on the target, click the IP address or term that
appears.
If the target is a single source, an IP address appears. You can
click the IP address to view the target details. If there are
multiple targets, the term Multiple appears. Click Multiple for a
table of targets to appear at the bottom of the panel.
Event Count
Specifies the total number of events associated with this
attacker.
First event seen on Specifies the date and time in which this attacker generated the
first event.
Last event seen on Specifies the date and time of the last generated event
associated with this attacker.
The Attacker details toolbar provides the following functions:
Table 5-10 Attacker Panel Toolbar
Icon
Function
Allows you to view the list of local targets for this attacker. See
Allows you to view a list of offenses associated with this attacker. See
Step 5
.
Actions
Using the Actions drop-down list box, you can choose one of the
following actions:
Follow up - Allows you to mark this attacker for further follow-up.
Marking an Item For Follow-Up
See
Email - Allows you to be notified through e-mail in the event this
attacker changes. See
Notes - Allows you to add notes to the attacker. See
Print - Allows you to print this attacker.
To view a list of local targets, click
The List of Local Targets appears.
Table 5-11 List of Local Targets
Parameter
Description
Flag
Specifies action taken on the target, for example, if a flag
appears, the offense is marked for follow-up. Point your mouse
over the icon to display additional information.
STRM Users Guide
.
Configuring Notification
Targets.
Step 4
.
.
Adding Notes
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents