Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 233

Table of Contents

Advertisement

collector view
credibility
custom sentry
custom views
database leaf objects
datapoint
DHCP
DNS
Domain Name
System (DNS)
duplicate flow
Dynamic Host
Configuration
Protocol (DHCP)
Encryption
Enterprise Security
State
Enterprise
Vulnerability State
Allows you to classify flows based on which QFlow Collector and interface from
which they originated.
Indicates the integrity of an event or offense as determined by the credibility rating
from source devices. Credibility increases as the multiple sources report the same
event.
You can create a custom sentry to your network has specific monitoring
requirements. A custom sentry can monitor for any required combination of
properties.
A view that you create that allows you to monitor network traffic specific to your
deployment.
The end point objects in a hierarchy. At each point in the hierarchy above this point
there would be a parent object that contains the aggregate values of all of the leaf
objects below.
Any point on the STRM graphs where data is extracted.
See Dynamic Host Configuration Protocol.
See Domain Name System.
An on-line, distributed database used to map human-readable machine names
into IP address for resolving machine names to IP addresses.
When multiple QFlow Collectors detect the same flow, this is referred to as a
duplicate flow. However, in this event, the QFlow Collector drops the flow as a
duplicate so the Classification Engine only receives one report on the flow.
A protocol that allows dynamic assignment of IP addresses to customer premise
equipment.
Encryption provides greater security for all STRM traffic between managed hosts.
When encryption is enabled for a managed host, encryption tunnels are created
for all client applications on a managed host to provide protected access to the
respective servers.
A graphical representation formulated from monitoring the security network data
that creates a single metric that reveals the security state of the network. This is
calculated average of the threat under, threat posing, vulnerability risk, and
network weight metrics.
A graphical representation formulated from monitoring the network vulnerability
data that creates a single metric that reveals the vulnerability state of the network.
This is a calculated average of the severity, credibility, and relevance metrics.
STRM Users Guide
G
227
LOSSARY

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents