STRM Users Guide
G
LOSSARY
231
Local To Remote
(L2R)
Internal traffic from a local network to a remote network.
logic unit
Sentry component that includes specific algorithms used to test objects.
Magistrate
Provides the core processing components of the SIM option. The Magistrate
provides views, reports, alerts, and analysis of network traffic and security events.
The Magistrate processes the event against the defined custom rules to create an
offense.
magnitude
Specifies the relative importance of the offense. The magnitude bar provides a
visual representation of all the correlated variables of the offense, attacker, target,
or network. Variables include Relevance, Severity, and Credibility. The magnitude
of an offense is determined by several tests that performed on an offense every
time it has been scheduled for re-evaluation, usually because a events have been
added or the minimum time for scheduling has occurred.
NAT
NAT translates an IP address in one network to a different IP address in another
network.
NetFlow
A proprietary accounting technology developed by Cisco Systems
®
Inc. that
monitors traffic flows through a switch or router, interprets the client, server,
protocol, and port used, counts the number of bytes and packets, and sends that
data to a NetFlow collector. You can configure STRM to accept NDE's and thus
become a NetFlow collector.
Network Address
Translation (NAT)
See NAT.
network hierarchy
Contains each component of your network, and identifies which objects belong
within other objects. The accuracy and completeness of this hierarchy is essential
to traffic analysis functions. The network hierarchy provides for storage of flow
logs, databases, and TopN files.
network layer
Layer 3 in the Open System Interconnection (OSI) architecture; the layer that
establishes a path between open systems.
network objects
Components of your network hierarchy. You can add layers to the hierarchy by
adding additional network objects and associating them to already defined objects.
(Objects that contain other objects are called groups.)
Network Surveillance
An emerging category of network security solutions that provides a comprehensive
view of all activity on the network. An NSI solution does not replace firewall, IDS, or
antivirus solutions, but integrates and correlates the data from these to provide an
unfiltered view of all activity on the network. An NSI solution significantly reduces
false positives and negatives associated with other security technologies, and
provides extensive correlation, and forensic capabilities for preventing internal and
external intrusions.
Summary of Contents for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Page 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Page 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Page 138: ......
Page 226: ......