Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 122

Table of Contents

Advertisement

116
I
O
NVESTIGATING
FFENSES
Hint: The top of the panel displays the navigation trail to the current view. If you
wish to return to a previously viewed panel, click the panel name on the navigation
trail.
The Networks details panel provides the following information:
Table 5-27 Networks Details Panel
Parameter
Description
Magnitude
Specifies the relative importance of attacks in the network. The
magnitude bar provides a visual representation of all the
correlated variables of the network. Variables include the
vulnerability easement risk, the threat posed, and the amount of
threat under.
Point your mouse to the magnitude bar to display values and the
calculated magnitude.
Name
Specifies the IP address of the network.
Offense(s)
Specifies the offense(s) launched from the network.
Launched
If the offense is a single source, the name of the offense
appears. If multiple offenses are responsible, the term Multiple
appears.
Offense(s)
Specifies the targeted offenses for the network.
Targeted
If the offense is a single source, the name of the offense
appears. If multiple offenses are responsible, the term Multiple
appears.
STRM Users Guide
Threat Posing - The calculated value for this network over
time, that indicates how severe the network is compared to all
other networks that include attackers.
Threat Under - The value applied to the threat a network is
under over time. This is calculated based on the average
weighted value of the threat posing over time.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents