Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 239

Table of Contents

Advertisement

QID
STRM Request
Language (QRL)
STRM Time
QRL
refresh timer
relevance
remote network view
remote services view
reports
report interval
Resolver
Resolver Action
Resolver Agent
Resolver Type
rule
STRM Identifier. A mapping of a single event of an external device to a Q1 Labs
unique identifier.
Specifies what information is queried in your graph and defines how it appears.
The QRL allows you to identify and remember a specific location and view on a
network. A QRL corresponds to one or more graphs.
The right corner of the STRM interface displays STRM time, which is the time of
the STRM Console. This is the time that determines the time of events and
offenses.
See STRM Request Language.
Dashboard features a dynamic status bar that displays the amount of time until
STRM automatically refreshes the current network activity data; built-in refresh can
be manually refreshed at any time.
Relevance determines the significance of an event, category or offense.
Allows you to define remote networks according to their name or location. Remote
network views allow you to verify the effectiveness of the firewall and determine
service abuse or targeting for your entire STRM deployment.
Using a remote IP address range, remote services views allow you to determine
how network resources are being used. By default, this view is disabled.
A function that creates executive or operational level charting representations of
network activity based on time, attackers, offenses, security, and events.
A configurable time interval at which the Flow Processor must send all captured
flow data to the Console.
A Resolver executes assigned Resolver Actions.
A Resolver Action blocks host(s) affecting your network. A Resolver Action can
have several Resolvers assigned as primary or reserve Resolvers.
A Resolver Agent is a collection of Resolvers that you wish to deploy a group.
Specifies the type of Resolver. The options are: TCP Reset, ARP Redirect, Cisco,
Cisco PIX, NetScreen, and Checkpoint Firewall Resolver.
Collection of conditions and consequent actions. You can configure rules that
allow STRM to capture and respond to specific event sequences. security/policy
sentry
Monitors your deployment for security/policy violations. A Security/Policy sentry
monitors your network for policy compliance at the network, application, or
STRM Users Guide
G
233
LOSSARY

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents