Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 107

Table of Contents

Advertisement

Table 5-11 List of Local Targets (continued)
Parameter
IP/DNS Name
Magnitude
Location
Offenses
Attacker/Src
Events
Last Event
Weight
The List of Local Targets panel provides the following functions:
Table 5-12 Target Panel Toolbar
Icon
To view a list of offenses associated with this attacker, click
Step 5
The List of Offenses appears.
Description
Specifies the IP address of the target. If DNS lookups is enabled
in the STRM Administration Console, you can view the DNS
name by pointing your mouse over the IP address or asset name.
For more information, see the STRM Administration Guide.
Specifies the relative importance of this target. The magnitude
bar provides a visual representation of all the correlated variables
of the target. Variables include the vulnerability assessment risk
and the amount of threat. Point your mouse to the magnitude bar
to display values and the calculated magnitude.
Specifies the location of the target
Specifies the number of offenses associated with this target.
Specifies the number of attackers associated with this target.
Specifies the number of events associated with this offense.
Specifies the date of the last event.
Specifies the weight of this asset.
Function
Allows you to view a list of offenses for this target. See
Allows you to view a list of attackers for this target. For more
Table 5-7
information, see
Allows you to search for targets of this attacker. To search targets:
1 Click Search.
2 Enter values for the parameters:
Target Network - Using the drop-down list box, select the network
you wish to search.
Magnitude - Using the drop-down list box, select whether you wish
to search for magnitude Equal to, Less than, or Greater than. Enter a
magnitude value you wish to search.
Sort by - Using the drop-down list box, select how you wish to sort
the search results.
3 Click Search.
The list of local targets appears. For more information on results, see
Table 5-11
table
.
STRM Users Guide
Managing Offenses By Attacker
.
101
Step 5
.
Offenses.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents