Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 230

Table of Contents

Advertisement

224
U
TNC R
SING
ECOMMENDATIONS
Step 4
Step 5
The Existing TNC Recommendations table provides the following information:
Table 10-2 Existing TNC Recommendations
Parameter
Description
Use
Allows you to select existing TNC recommendations.
Based On
Specifies the existing recommended conditions. The options are:
mac, host, machine name, user, user group, or extra data.
Recommendation Specifies the recommended action. The options are ALLOW,
DENY, or RESTRICT.
Compliance
Specifies the current compliance option. The options are:
COMPLIANT, MINOR_NON_COMPLIANT,
MAJOR_NON_COMPLIANT
End Date
Specifies the configured end date for the recommendation.
Select the appropriate check box(es) for the recommendations you wish to
remove.
Click Delete Recommendations.
STRM Users Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents