STRM Users Guide
G
LOSSARY
235
TCP resets
For TCP-based applications, STRM can issue a TCP reset to either the client or
server in a conversation. This stops the communications between the client and
the server.
threat posing
The degree or level of threat an attacker (source) is posing; calculated per interval.
Threat posing is calculated using the aggregated target category, added to the
aggregated Attacker then multiplied by the average number of offenses the
attacker has been associated with.
threat under
The degree or level of threat the target (destination) is under; calculated per
interval. Threat under is calculated using the target category aggregate for an
interval, multiplied by the average number of offenses the target has been
associated with.
threat view
A security-based custom view that contains object groups based on possible
threats to your network, including DOS, worms, and stealth activities.
threshold sentry
Monitors your deployment for activity that exceeds the configured threshold of the
sentry. STRM monitors relevant network objects and identifies whenever a
threshold is exceeded. Thresholds can be based on any data collected by STRM,
not just packet count or bandwidth.
Time Series
A reporting chart that graphs data based on time. This chart focuses on the
networks or IP address data information from the selected networks.
TopN
Displays the top
N
networks or IP address information for the data you are viewing.
For example, if you are using a Geographic view for U.S. data traffic, TopN can
display the top five networks generating traffic in the U.S.
TopN Time Series
A reporting graph option that focuses on the top N networks or IP address data
information, based on time, for the data you are graphing.
Transmission
Control Protocol
(TCP)
A reliable stream service that operates at the transport-layer Internet protocol,
which ensures successful end-to-end delivery of data packets without error.
Update Daemon
Stores all processed data.
view
Network activity is classified into a number of views that reflect a particular aspect
or property of the activity. These views determine what and how information is
displayed.
view objects
Groups and components in the defined view.
violation
Includes a violation of corporate policy.
Whois
Allows you to look up information about registered Internet names and numbers.
Summary of Contents for SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Page 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Page 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Page 138: ......
Page 226: ......