Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 228

Table of Contents

Advertisement

222
U
TNC R
SING
ECOMMENDATIONS
Step 3
Step 4
Step 5
View the TNC Recommendation table to identify possible TNC
recommendations.The table provides the following information:
Table 10-1 TNC Recommendations
Parameter
Description
MAC
Specifies the MAC address of the user.
Host Name
Specifies the host name associated with the user.
Machine Name
Specifies the name of the system associated with the user.
User
Specifies the user name.
User Group
Specifies the group associated to the user.
Extra Data
Specifies any extra information based on an event. The content
of this field depends on the devices on your network.
Last Observed
Specifies the date and time when the data was recorded.
Select the row that corresponds to the TNC recommendation you wish to create.
The Recommendation Details indicates the conditions under which access can be
allowed, denied, or restricted.
Update the recommendations, as necessary:
Recommended action - Using the drop-down list box, select the desired action
including Deny, Allow, or Restrict.
Indicates compliance - Using the drop-down list box, specify the compliance
value you wish to be provided with the recommendation suggesting whether or
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents