Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 245

Table of Contents

Advertisement

239
by category 93
,
closing 90
91
closing all filtered offenses 90
closing filtered offenses 92
hiding 90
managing 79
removing 90
searching 88
viewing 79
viewing dismissed 91
P
Package 40
pausing the interface 10
policy category 95
potential exploit category 95
Q
STRM
overview 3
using 9
QRL definition 33
QRL options
about 27
R
raw events 139
recon category 95
refreshing the interface 10
removing an item 15
report templates
default 216
reports
about 181
brand 218
chart type 196
container 188
content 188
creating 188
creating a template 189
default templates 216
distribution channels 193
editing 216
formatting 193
generate 217
graph type 214
grouping 184
assigning 188
copying 186
creating 185
deleting 187
editing 186
layout 188
layout preview 193
navigation menu 182
overview 9
scheduling options 189
selecting a container 192
selecting the layout 191
summary 195
template 189
time series chart 201
toolbar 183
top attackers chart 205
top offenses chart 207
top targeted assets chart 209
using the interface 182
viewing 183
S
security/policy sentry 41
creating 44
sentry
about 39
anomaly
about 41
creating 56
behavior
about 40
creating 49
creating 43
custom 42
creating 66
editing 72
Logic Unit 40
Package 40
security/policy
about 41
creating 44
threshold
about 42
creating 61
types 40
variables 74
viewing 42
sentry layers 75
SIM audit category 95
SNMP trap 48
sorting results 9
suspicious category 95
system category 96
T
target threat under 22
targets 106
searching 112
top 5 84
Threats View 31
threshold sentry 42
creating 61
time series 201
TNC recommendations 221
configuring 221
removing 223
top attackers 205
top attackers chart 205
top offenses 207
STRM Users Guide
I
NDEX

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents