104
I
O
NVESTIGATING
FFENSES
Searching Attackers
Step 1
Step 2
Step 3
Step 4
Table 5-14 Offense Panel Toolbar (continued)
Icon
Function
Actions
Using the Actions drop-down list box, you can choose one of the
following actions:
Hide - Allows you to hide this offense. For more information on
•
hiding offenses, see
Show - Allows you to show all hidden offenses. For more
•
information on hiding and showing offenses, see
Close - Allows you to close an offenses. For more information on
•
closing offenses, see
To search attackers:
Click the Offense Manager tab.
The Offense Manager window appears.
Click By Attacker.
The By Attacker summary window appears.
Click Search.
The Attacker Search window appears.
Enter values for the parameters:
Table 5-15 Attacker Search Parameters
Item
Description
Attacker IP
Specify the IP address of the attacker.
Magnitude
Using the drop-down list box, select if you wish to search magnitude
equal to, less than, or greater than the configured value. The range is
0 to 10.
Vulnerability
Using the drop-down list box, select if you wish to search vulnerability
Risk
risk equal to, less than, or greater than the configured value. The
range is 0 to 10.
Threat Posing Using the drop-down list box, select if you wish to search the threat
posed equal to, less than, or greater than the configured value. The
range is 0 to 10.
STRM Users Guide
Hiding Offenses
.
Closing an Offense
.
Hiding Offenses
.