Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 125

Table of Contents

Advertisement

Table 5-31 List of Targets (continued)
Parameter
Magnitude
Location
Offenses
Attacker/Src
Events
Last Event
Weight
The List of Targets panel provides the following functions:
Table 5-32 Target Panel Toolbar
Icon
To view a list of offenses associated with this attacker, click
Step 6
Description
Specifies the relative importance of this target. The magnitude
bar provides a visual representation of all the correlated variables
of the target. Point your mouse to the magnitude bar to values for
the offense and the calculated magnitude. Variables include the
vulnerability assessment risk and the threat under.
Threat Under - The value applied to the threat a target is
under over time. This is calculated based on the average
weighted value of the threat posing over time.
Vulnerability Risk - The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Specifies the location of the target.
Specifies the number of offenses associated with this target.
Specifies the number of attackers associated with this target.
Specifies the number of events associated with this offense.
Specifies the date of the last event.
Specifies the weight of the asset.
Function
Allows you to view a list of offenses for this attacker. See
Allows you to view a list of attackers. For more information, see
Table 5-29
.
Allows you to search for targets of this attacker. To search targets:
1 Click Search.
2 Enter values for the parameters:
Target Network - Using the drop-down list box, select the network
you wish to search.
Magnitude - Using the drop-down list box, select whether you wish
to search for magnitude Equal to, Less than, or Greater than. Enter a
magnitude value you wish to search.
Sort by - Using the drop-down list box, select how you wish to sort
the search results.
3 Click Search.
The list of local targets appears. For more information on results, see
table
Table 5-11
.
STRM Users Guide
Managing Offenses By Networks
Offenses.
119
Step 6
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents