Bookmarks; Qrl Options - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual

Table of Contents

Advertisement

Bookmarks

You can create a bookmark from any area on the STRM graphs. This allows you to
access your bookmarks at any time to revisit a specific network location or specific
time frame.
When creating a bookmark, the following options are available:
Add With Time - Saves the QRL with the time period that is displayed on the
graphs.
Add Without Time - Saves the QRL without preserving the time period.
Manage Bookmarks - Executes the Bookmark Manager.
You can navigate through bookmarks from the following icons:
Table 3-1 Icons
Icon

QRL Options

QRL (STRM Request Language) provides the tools required to distribute QRL
information. The QRL also provides options on how STRM displays your network
traffic including:
Email QRL - Allows you to e-mail other STRM users with your current view's
QRL.
Expand Legend - STRM hides inactive components with no current traffic
activity. This option displays all legend objects and items.
No Scales - Allows you to change the graph appearance and remove the
scales from the graphs. When accessed, the menu option changes to scales
and allows you to reapply the scales to the graphs.
Graph By Lines - Allows you to change the traffic appearance to lines or
stacks. When accessed, the menu option changes to Graph By Stacks and
displays the traffic in stacked format. Graphing by stacked bars displays the
exact values from the database. Graphing by lines creates a consecutive line
from the top of one value on the X axis to the tops of the subsequent values that
appear on the graphs.
Description
View the bookmarked information on the STRM graphs.
Click the search icon to view the bookmarked view. For more information
Chapter 3
on bookmarks, see
Click the delete icon to delete the bookmark. To delete multiple bookmarks,
select all the bookmarks you wish to delete and click Delete Selected.
STRM Users Guide
Using the Network Surveillance Menu
Managing Your Network Activity
,
27
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents