STRM Users Guide
224
U
SING
TNC R
ECOMMENDATIONS
The Existing TNC Recommendations table provides the following information:
Step 4
Select the appropriate check box(es) for the recommendations you wish to
remove.
Step 5
Click
Delete Recommendations
.
Table 10-2
Existing TNC Recommendations
Parameter
Description
Use
Allows you to select existing TNC recommendations.
Based On
Specifies the existing recommended conditions. The options are:
mac, host, machine name, user, user group, or extra data.
Recommendation Specifies the recommended action. The options are ALLOW,
DENY, or RESTRICT.
Compliance
Specifies the current compliance option. The options are:
COMPLIANT, MINOR_NON_COMPLIANT,
MAJOR_NON_COMPLIANT
End Date
Specifies the configured end date for the recommendation.
Summary of Contents for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Page 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Page 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Page 138: ......
Page 226: ......