Searching Targets - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual

Table of Contents

Advertisement

112
I
O
NVESTIGATING
FFENSES

Searching Targets

Step 1
Step 2
Step 3
Table 5-22 List of Attackers (continued)
Parameter
Description
Magnitude
Specifies the relative importance of this attacker. The magnitude
bar provides a visual representation of all the correlated variables
of the attacker. Variables include the vulnerability assessment
risk and the amount of threat posed. Point your mouse to the
magnitude bar to values for the offense and the calculated
magnitude.
Offenses
Specifies the number of offenses associated with this attacker.
Local
Specifies the number of targets associated with this attacker.
Target(s)/Dest
Events
Specifies the number of events associated with this attacker.
The List of Attackers panel provides the following functions:
Table 5-23 Attackers Panel Toolbar
Icon
Function
Allows you to view local or remote targets for this offense. For more
information on targets, see
Allows you to view a list of offenses for this target. For more
information, see
To search targets:
Click the Offense Manager tab.
The Offense Manager window appears.
Click By Target.
The By Target summary window appears.
Click Search.
The Target Search window appears.
STRM Users Guide
Threat Posed - The calculated value for this attacker over
time, that indicates how severe the attacker is compared to all
other attackers in your network.
Vulnerability Risk - The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Managing Offenses By Targets
Managing Offenses
.
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents