Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 126

Table of Contents

Advertisement

120
I
O
NVESTIGATING
FFENSES
The List of Offenses appears.
Table 5-33 List of Offenses
Parameter
Description
Flag
Specifies action taken on the offense, for example, if a flag
appears, the offense is marked for follow-up or if a user icon
appears, the offense has been assigned to a user. Point your
mouse over the icon to display additional information.
Id
Specifies the STRM identifier for this offense.
Description
Specifies the description for this offense.
Attacker/Src
Specifies the IP address of the target associated with the offense.
Magnitude
Specifies the relative importance of this offense. The magnitude
bar provides a visual representation of all the correlated variables
of the network. Variables include credibility, relevance, and
severity. Point your mouse to the magnitude bar to values for the
offense and the calculated magnitude.
Target(s)/Dest
Specifies the IP address of the target associated with this
offense.
Attacker Net
Specifies the attacker network for this offense.
Target Net
Specifies the target network for this offense.
Events
Specifies the number of events associated with this offense.
Start Date
Specifies the first occurrence of this offense.
Last Event
Specifies the date of the last event.
The List of Offenses panel provides the following functions:
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents