STRM Users Guide
118
I
NVESTIGATING
O
FFENSES
The List of Attackers panel provides the following functions:
Step 5
To view a list of offenses associated with this attacker, click
Targets.
The List of Targets appears.
Magnitude
Specifies the relative importance of this attacker. The magnitude
bar provides a visual representation of all the correlated variables
of the attacker. Variables include the vulnerability assessment
risk and the amount of threat posed. Point your mouse to the
magnitude bar to values for the offense and the calculated
magnitude.
•
Threat Posed
- The calculated value for this attacker over
time, that indicates how severe the attacker is compared to all
other attackers in your network.
•
Vulnerability Risk
- The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Offenses
Specifies the number of offenses associated with this attacker.
Local
Target(s)/Dest
Specifies the number of targets associated with this attacker.
Events
Specifies the number of events associated with this attacker.
Table 5-30
Attackers Panel Toolbar
Icon
Function
Allows you to view remote or local targets for this attacker. For more
information on targets, see
Managing Offenses By Targets
.
Allows you to view offenses associated with this attacker. For more
information on offenses, see
Managing Offenses
.
Table 5-29
List of Attackers (continued)
Parameter
Description
Table 5-31
List of Targets
Parameter
Description
Flag
Specifies action taken on the offense, for example, if a flag
appears, the target is marked for follow-up. Point your mouse
over the icon to display additional information.
IP/DNS Name
Specifies the IP address of the target. If DNS lookups is enabled
in the STRM Administration Console, you can view the DNS
name by pointing your mouse over the IP address or asset name.
For more information, see the
STRM Administration Guide
.
Summary of Contents for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Page 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Page 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Page 138: ......
Page 226: ......