Searching Attackers - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual

Table of Contents

Advertisement

104
I
O
NVESTIGATING
FFENSES

Searching Attackers

Step 1
Step 2
Step 3
Step 4
Table 5-14 Offense Panel Toolbar (continued)
Icon
Function
Actions
Using the Actions drop-down list box, you can choose one of the
following actions:
Hide - Allows you to hide this offense. For more information on
hiding offenses, see
Show - Allows you to show all hidden offenses. For more
information on hiding and showing offenses, see
Close - Allows you to close an offenses. For more information on
closing offenses, see
To search attackers:
Click the Offense Manager tab.
The Offense Manager window appears.
Click By Attacker.
The By Attacker summary window appears.
Click Search.
The Attacker Search window appears.
Enter values for the parameters:
Table 5-15 Attacker Search Parameters
Item
Description
Attacker IP
Specify the IP address of the attacker.
Magnitude
Using the drop-down list box, select if you wish to search magnitude
equal to, less than, or greater than the configured value. The range is
0 to 10.
Vulnerability
Using the drop-down list box, select if you wish to search vulnerability
Risk
risk equal to, less than, or greater than the configured value. The
range is 0 to 10.
Threat Posing Using the drop-down list box, select if you wish to search the threat
posed equal to, less than, or greater than the configured value. The
range is 0 to 10.
STRM Users Guide
Hiding Offenses
.
Closing an Offense
.
Hiding Offenses
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents