Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 142

Table of Contents

Advertisement

136
U
E
SING THE
VENT
Step 2
V
IEWER
From the Display drop-down list box, select None.
Table 6-3 Event Viewer
Parameter
Current Filters
Event Name
Device
Event Count
Time
Low Level
Category
Source IP
Source Port
Destination IP
Destination Port
Username
Magnitude
Description
The top of the table displays the details of the filter applied to the
search results. To clear these filter values, click Clear Filter.
Allows you to view details of the offense associated with this
event. For more information, see
Offense
.
Specifies the normalized name of the event.
Specifies the device that sent the event to STRM.
Specifies the total number of bundled events that constitute this
normalized event. Events are bundled when many of the same
type of event for the same source and destination IP address are
seen within a short period of time.
Specifies the date and time that STRM received the event.
Specifies the low-level category associated to this event. For
more information on event categories, see the Event Category
Correlation Reference Guide.
Specifies the source IP address of the event.
Specifies the source port of the event.
Specifies the destination IP address of the event.
Specifies the destination port of the event.
Specifies the username associated with this event. Usernames
are often available in authentication related events. For all other
types of events where the username is not available, this field is
empty.
Specifies the magnitude of this event. Variables include
credibility, relevance, and severity. Point your mouse to the
magnitude bar to display values and the calculated magnitude.
STRM Users Guide
Viewing the Associated

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents