Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 124

Table of Contents

Advertisement

118
I
O
NVESTIGATING
FFENSES
Step 5
Table 5-29 List of Attackers (continued)
Parameter
Description
Magnitude
Specifies the relative importance of this attacker. The magnitude
bar provides a visual representation of all the correlated variables
of the attacker. Variables include the vulnerability assessment
risk and the amount of threat posed. Point your mouse to the
magnitude bar to values for the offense and the calculated
magnitude.
Offenses
Specifies the number of offenses associated with this attacker.
Local
Specifies the number of targets associated with this attacker.
Target(s)/Dest
Events
Specifies the number of events associated with this attacker.
The List of Attackers panel provides the following functions:
Table 5-30 Attackers Panel Toolbar
Icon
Function
Allows you to view remote or local targets for this attacker. For more
information on targets, see
Allows you to view offenses associated with this attacker. For more
information on offenses, see
To view a list of offenses associated with this attacker, click
The List of Targets appears.
Table 5-31 List of Targets
Parameter
Description
Flag
Specifies action taken on the offense, for example, if a flag
appears, the target is marked for follow-up. Point your mouse
over the icon to display additional information.
IP/DNS Name
Specifies the IP address of the target. If DNS lookups is enabled
in the STRM Administration Console, you can view the DNS
name by pointing your mouse over the IP address or asset name.
For more information, see the STRM Administration Guide.
STRM Users Guide
Threat Posed - The calculated value for this attacker over
time, that indicates how severe the attacker is compared to all
other attackers in your network.
Vulnerability Risk - The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Managing Offenses By Targets
Managing Offenses
.
.
Targets.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents