Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 121

Table of Contents

Advertisement

Table 5-25 Viewing Network Parameters (continued)
Parameter
Magnitude
Attackers/Src
Offenses Targeted Specifies the number of offenses targeted for the network.
Offenses
Launched
Events
Either double-click the item you wish view or, from the toolbar, choose one of the
Step 3
following options:
Table 5-26 View Options
Icon
Hint: If you wish to view the details in a new window, press CTRL+double-click.
The Networks detail panel appears.
Description
Specifies the relative importance of the attacks in the network.
The magnitude bar provides a visual representation of all the
correlated variables of the network. Variables include the threat
posed, threat under, and vulnerability risk:
Threat Posing - The calculated value for this network over
time, that indicates how severe the network is compared to all
other networks that include attackers.
Threat Under - The value applied to the threat a network is
under over time. This is calculated based on the average
weighted value of the threat posing over time.
Vulnerability Risk - The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Point your mouse to the magnitude bar to display values and the
calculated magnitude.
Specifies the number of attackers associated to this network.
Specifies the number of offenses originated from the network.
Specifies the number of events associated to this network.
Option
Displays all offenses of this network. For more information on offenses,
Managing Offenses
see
Displays all attackers of this network. For more information on
Managing Offenses By Attacker
attackers, see
Displays all targets of this network. For more information on targets, see
Managing Offenses By Targets
STRM Users Guide
Managing Offenses By Networks
.
.
115
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents