Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 20

Table of Contents

Advertisement

14
U
D
SING THE
ASHBOARD
Most Recent Offenses
Local Networks - Inbound Bytes
Local Networks - Outbound Bytes
Top Category Types
Top Attackers
Note: The items that appear on your Dashboard depends on the access you have
been granted. For more information on user roles, see the STRM Administration
Guide.
The content that appears on the Dashboard is user-specific. You can design the
Dashboard as you wish, as the changes made within a STRM session affect only
your system. The next time you log in, STRM reflects your last Dashboard
configuration.
You can move and position items to meet your requirements. You can stack items
in one panel or distribute them evenly within the three panels. When positioning
items, each item automatically resizes in proportion to the panel. The Dashboard
interface refreshes regularly to display the most recent information.
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents