Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 18

Table of Contents

Advertisement

12
A
STRM
BOUT
Managing vulnerability assessment and scanners - Allows you to schedule
scans to keep your vulnerability assessment data up-to-date.
Configure sensor devices - Allows you to configure sensor devices, which
provide events to your deployment through DSMs.
Configure flow sources - Allows you to configure flow sources, such as,
NetFlow or Packeteer.
All configuration updates using the Administration Console are saved to a staging
area. Once all changes are complete, you can deploy the configuration changes or
all configuration settings to the remainder of your deployment.
For more information regarding the STRM Administration Console, see the STRM
Administration Guide.
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents