Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 89

Table of Contents

Advertisement

Table 5-3 Offense Details Panel (continued)
Parameter
Description
Assigned to
Specifies the user assigned to this offense.
If not user is assigned, this field indicates Not Assigned. Click
Not Assigned to assign this offense to a user.
Attacker
Specifies information on details of the attacker that created this
Summary
offense. Click Details to view additional information.
Magnitude
Specifies the relative importance of the attacker. The magnitude
bar provides a visual representation of all the correlated
variables of the attacker. Variables include the vulnerability
assessment risk and the amount of threat posed.
Point your mouse to the magnitude bar to display values and the
calculated magnitude.
Description
Specifies the name or IP address of the attacker.
Vulnerabilities
Specifies the number of identified vulnerabilities associated with
this attacker. This value also includes the number of active and
passive vulnerabilities.
Location
Specifies the network location where this attacker is located. If
the location is local, you can click the link to view the networks.
User
Specifies the user associated to this attacker when the attack
began. If no user is identified, the field indicates unknown.
MAC
Specifies the MAC address of the IP address when the offense
began. If the MAC address is unknown, this field is unknown.
Asset Weight
Specifies the asset weight, as assigned using the Asset Profile
function.
Top 5 Categories
Specifies the top 5 global categories, which are part of this
offense, organized by magnitude. Click Categories to view
additional information.
Name
Specifies the name of the category.
Magnitude
Specifies the relative importance of the offense. The magnitude
bar provides a visual representation of all the correlated
variables of the attacker. Variables include Relevance, Severity,
and Credibility. Point your mouse to the magnitude bar to values
for the offense and the calculated magnitude.
Local Target Count Specifies the number of local targets associated with this
offense.
Events
Specifies the number of events in this offense that are
associated with this category.
STRM Users Guide
Threat Posed - The calculated value for this attacker over
time, that indicates how severe the attacker is compared to all
other attackers in your network.
Vulnerability Risk - The vulnerability assessment risk level
(0 to 10) for the asset where 0 is the lowest and 10 is the
highest. This is a weighted value against all other hosts in
your deployment.
Managing Offenses
83

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents