Configuring Tnc Recommendations - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual

Table of Contents

Advertisement

10
Configuring TNC
Recommendations
Step 1
Step 2
U
TNC R
SING
Trusted Network Computing (TNC) recommendations allow you to restrict or deny
network access to users based on user name or other credentials. The TNC
recommendation uses the asset profile and user identify data collected by STRM.
You must have appropriate network access to use the TNC recommendations
function.
Once you create TNC recommendations and a matching recommendation is found
during a request from an access controller, STRM supplies the most severe
recommendation. For example, if two recommendations exist for a user, the first
includes a restrict recommendation and the second with a deny recommendation,
STRM recommends the deny action.
Note: Before you create TNC recommendations, you must install the Integrity
Measurement Collector (IMC) and the Integrity Measurement Verifier (IMV) plug-in
according to the TNC architecture. For more information, see the Integrating TNC
Technical Note.
This chapter includes:

Configuring TNC Recommendations

Removing TNC Recommendations
To configure TNC recommendations:
On any IP address or asset name, use the right-mouse button (right-click) to
display the right-click menu.
Select TNC Recommendations.
The TNC Recommendation window appears.
Note: If the TNC Recommendations option is not active, you can enable this
functionality using the System Settings option in the STRMAdministration Console.
For more information, see the STRM Administration Guide.
STRM Users Guide
ECOMMENDATIONS

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents