Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 176

Table of Contents

Advertisement

170
M
A
ANAGING
SSETS
Step 3
Step 4
Choose one of the following options:
Current - Searches current asset profile values. This is the default.
History - Searches the database for assets associated with a specific user
name, user group, MAC address, or within a specified time frame.
Enter values for the parameters:
Table 8-1 Assets Panel
Parameter
Description
IP
Specify the IP address or CIDR range. This displays the assets that
match the IP address or CIDR criteria.
MAC
Specify the MAC address of the asset. This field may be a
maximum of 20 characters.
Host Name
Specify the host name of the asset. This field supports using
special characters to aid your search including:
* - Specifies any text.
? - Specifies any single character.
! - Specifies that you wish to change the * or ? symbol to a valid
symbol. For example, if you include a hostname of !*machine1, this
means you are searching for a system named *machine1.
Machine Name
Specify the machine name of the asset. This field supports using
special characters to aid your search including:
* - Specifies any text.
? - Specifies any single character.
! - Specifies that you wish to change the * or ? symbol to a valid
symbol. For example, if you include a hostname of !*machine1, this
means you are searching for a system named *machine1.
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents