STRM Default Application Configuration Guide
A
BOUT
T
HIS
G
UIDE
The
STRM Application Configuration Guide
provides you with information on how
to investigate various types of security threats using the Offense Manager, Event
Viewer, or the Flow Viewer.
Conventions
Table 1
lists conventions that are used throughout this guide.
Technical
Documentation
You can access technical documentation, technical notes, and release notes
directly from the Juniper networks Support Web site at
http://
www.juniper.net/support
/.
Documentation
Feedback
We encourage you to provide feedback, comments, and suggestions so that we
can improve the documentation. Send your comments to
, or
fill out the documentation feedback form at
http://www.juniper.net/techpubs/docbug/docbugreport.html
. If you are using e-mail, be
sure to include the following information with your comments:
•
Document name
•
Document part number
•
Page number
•
Software release version
Table 1
Icons
Icon
Type
Description
Information note
Information that describes important features or
instructions.
Caution
Information that alerts you to potential loss of
data or potential damage to an application,
system, device, or network.
Warning
Information that alerts you to potential personal
injury.