Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 183

Table of Contents

Advertisement

Table 8-7 Asset Profile Window (continued)
Parameter
Operating System
Host Name (DNS Name) Specifies the IP address or DNS name of the asset.
Asset Weight
VA Risk Level
How Threatening
How Threatened
To view port information, click Ports.
Step 6
Table 8-8 Ports Information
Parameter
Port
OSVDB ID
Name
Description
Risk/Severity
Last Seen
First Seen
To view History information, click History.
Step 7
Table 8-9 History Information
Parameter
MAC
Host Name
Description
Specifies the operating system running on the asset.
Specify the asset weight of the asset.
Specifies the vulnerability assessment risk level (0 to 10)
for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Specifies the threat level (0 to 10) posed by the asset
where 0 is the lowest and 10 is the highest. This is a
weighted value against all other hosts in your deployment.
Specifies the threat level (0 to 10) to the asset where 0 is
the lowest and 10 is the highest. This is a weighted value
against all other hosts in your deployment.
Description
Specifies the port number for the services discovered
running on the asset.
Specifies the vulnerability identifier for the asset. Click the
ID to obtain more information.
Specifies the name of the detected vulnerability. This value
is only available when integrating with VA tools.
Specifies a description of the detected vulnerability. This
value is only available when integrating with VA tools.
Specifies the risk level (0 to 10) for the vulnerability.
Specifies the date and time that the service was last
detected running on the asset both either passively or
actively.
Specifies the date and time when the service was first
detected running on the asset both either passively or
actively.
Description
Specifies the MAC address for this asset. If unknown, this
field is blank.
Specifies the host name of this asset. If unknown, this field
is blank.
STRM Users Guide
Editing an Asset
177

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents