Managing Network Anomalies; Viewing Network Anomaly Offenses - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual

Table of Contents

Advertisement

Step 5
Step 6
Managing Network
Anomalies
Viewing Network
Anomaly Offenses
Step 1
Step 2
In the Email address(es) field, enter the email address of the user you wish to
notify if a change occurs to the selected offense. Separate multiple e-mail
addresses with a comma.
Click Save.
You can create sentries for your deployment and if an event generates as a result
of a threshold, behavior, or anomaly sentry, the details appear in Network
Anomalies offenses. Offenses are automatically updated every 10 minutes.
This section provides information on managing network anomaly offenses
including:

Viewing Network Anomaly Offenses

Closing Offenses
Forwarding Network Anomaly Offenses
To view network anomaly offenses:
Click the Offense Manager tab.
The Offense Manager window appears.
In the navigation menu, click Network Anomalies.
The Network Anomalies panel appears.
STRM Users Guide

Managing Network Anomalies

127

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents