Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 119

Table of Contents

Advertisement

Enter values for the parameters:
Step 4
Table 5-24 Target Search Parameters
Item
Target IP
Magnitude
Vulnerability
Risk
Threat Under
Event Count
Start Date
Between
Last Event
Between
Sort by
Click Search.
Step 5
The search results appear. The search results consider all targets in the database,
including targets without associated active offenses.
Description
Specify the IP address of the target.
Using the drop-down list box, select if you wish to search magnitude
equal to, less than, or greater than the configured value. The range is
0 to 10.
Using the drop-down list box, select if you wish to search vulnerability
risk equal to, less than, or greater than the configured value. The
range is 0 to 10.
Using the drop-down list box, select if you wish to search the amount
of threat the target is experiencing to be equal to, less than, or
greater than the configured value.
Using the drop-down list box, select if you wish to search the event
count equal to, less than, or greater than the configured value.
Select the check box if you wish to search targets whose existence
was first recorded in the STRM database during a certain time period.
Once you select the check box, use the calendar to select the dates
you wish to search.
Select the check box if you wish to search targets that the last
detected event occurred within a certain time period. Once you select
the check box, use the calendar to select the dates you wish to
search.
Using the drop-down list box, select the parameter you wish to use to
sort the search results. Also, select the Asc (Ascending) or Desc
(Descending) parameters to determine how the search results
appear in the list.
STRM Users Guide
Managing Offenses By Targets
113

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents