Sign In
Upload
Manuals
Brands
Juniper Manuals
Software
SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1 Manuals
Manuals and User Guides for Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1. We have
1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1 manual available for free PDF download: Manual
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - ADAPTIVE LOG EXPORTER REV1 Manual (74 pages)
STRM Adaptive Log Exporter
Brand:
Juniper
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
3
About this Guide
5
Conventions
5
Technical Documentation
5
Documentation Feedback
5
Requesting Support
6
Overview
7
Integrating Device Support Modules (Dsms) with STRM
7
Using the Adaptive Log Exporter
8
Using the Menu
8
Using the Toolbar
8
Deploying Changes
9
Installing the Adaptive Log Exporter
11
Before You Begin
11
Un-Installing the Adaptive Log Exporter
15
Using the Preferences Window
17
Managing Updates
18
Configuring Adaptive Log Exporter Updates
18
Scheduling Automatic Updates
21
Configuring the Update Site
23
Configuring Updates for Off-Line Sites
24
Managing Devices
27
Installing Device Types
27
Updating Devices
29
Configuring Devices
31
Adding a Device
31
Editing a Device
33
Deleting a Device
34
Managing Destinations
37
Configuring Destinations
37
Adding a Destination
37
Editing a Destination
39
Deleting a Destination
41
Mapping to a Destination
42
Creating a Mapping
42
Removing a Mapping
43
Configuring the Cisco ACS Device
45
Configuring the Cisco CSA Device
47
Configuring the File Forwarder Device
49
Configuring the Juniper SBR Device
51
Configuring the Windows Event Log Device
53
Configuring the Microsoft DHCP Device
55
Configuring the Trend Micro Interscan Viruswall Device
57
Configuring the Microsoft Exchange Server Device
59
Forwarding OWA Logs
59
Forwarding SMTP Logs
60
Configuring the Microsoft SQL Server Device
61
Configuring the Microsoft IIS Device
63
Collecting Windows Event Logs
65
Collecting Logs Without an Agent
66
Configuring the Adaptive Log Exporter
67
Collecting Logs with an Agent
69
Configuring the Adaptive Log Exporter
70
Configuring STRM to Accept Logs
73
Advertisement
Advertisement
Related Products
Juniper SECURITY THREAT RESPONSE MANAGER - LOG MANAGEMENT INSTALLATION REV 1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1
Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - INSTALLATION REV1
Juniper SECURITY THREAT RESPONSE MANAGER - APPLICATION CONFIGURATION GUIDE REV 1
Juniper SECURITY THREAT RESPONSE MANAGER - SOFTWARE INSTALLATION REV 1
Juniper Security Threat Response Manager
Juniper TePM Agent
Juniper T1600
Juniper TX MATRIX PLUS
Juniper TCA8000
Juniper Categories
Network Router
Switch
Gateway
Software
Network Hardware
More Juniper Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL