STRM Users Guide
2
U
SING
THE
D
ASHBOARD
The Dashboard allows you to create a customized portal to monitor any data
STRM collects, to which you have access. The Dashboard is the default view
when you log in to STRM and allows you to monitor several areas of your network
at the same time. Normal activity, vulnerabilities, and suspicious behaviors can be
investigated directly from the Dashboard. All information displayed on the
Dashboard is current and provides you with a real-time portal into the status of
your network traffic and assets. You can detach an item and monitor the item
directly from your desktop.
This chapter includes:
•
About the Dashboard
•
Network Surveillance
•
Offense Manager
•
Event Viewer
•
Reports
•
Enterprise Security State
•
Enterprise Security State
•
Enterprise Vulnerability State
•
System Summary
•
Adding Items
About the
Dashboard
The Dashboard allows you to monitor your overall network behavior, security and
vulnerability posture, top targeted assets, top attackers, and worst and most recent
security offenses - all from one window.
By default, for non-administrative users, the Dashboard is empty. For
administrative users, the Dashboard displays the following:
•
System Summary
•
Events - Average Events Per Second
•
Offenses - New Offense Count
•
Most Severe Offenses
Summary of Contents for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Page 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Page 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Page 138: ......
Page 226: ......