background image

530-025628-01

Known Issues and Limitations

9

option that enables the browser to notify you when the download is complete. 
However, if you are using Internet Explorer 7, a warning appears requiring you to 
select an option menu to download the file. When you select the option menu, the 
browser refreshes to the STRM Log Management Dashboard and the exported file 
is not downloaded. 

Workaround

: In Internet Explorer 7, change the Security Settings > Downloads > 

Automatic Prompting for file downloads option to Enable. 

Continuous Use of STRM Log Management Over Extended Period of Time 
May Cause Interface Failure

If you continue to use a session of the STRM Log Management interface for an 
extended period of time, a failure may occur in your browser requiring you to 
restart your system. This failure is a result of a memory loss due to a limitation in 
the web browser architecture.

Workaround

: Restart your browser if your browser performance degrades. 

Infranet Controller Device Appears as Enterasys Device

An auto-discovered Infranet Controller (IC) device may appear incorrectly as an 
Enterasys device.

Workaround

: Add the Infranet Controller device manually.

Infranet Controller Device Appears as Secure Access Device

An auto-discovered Infranet Controller (IC) device may appear incorrectly as a 
Secure Access (SA) device.

Workaround

: Add the Infranet Controller device manually.

System 

Configuration

Restoring Configuration Information for Deployment with Encrypted 
Systems Fails

If you attempt to restore configuration information in a deployment that includes 
encrypted systems and then deploy all changes, the restore process fails for the 
encrypted systems. 

Workaround: Follow the 

Restoring Your Configuration 

procedure outlined in the 

STRM Log Management Administration Guide

, however, before you deploy all 

changes, wait for the STRM Log Management interface to become active. Once 
the interface is active, follow this procedure:

Step 1

Log in to STRM Log Management, as root.

Step 2

Enter the following command and any non-Console passwords, as prompted:

/opt/qradar/bin/push_ssh_auth_keys.sh

Step 3

On the Console, enter the following command:

ssh <IP address/hostname of the non-Console>

Step 4

On the non-Console, enter the following command:

ssh <IP address/hostname of the Console>

Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1

Страница 1: ...ager Log Management Only STRM LM provides a comprehensive log management solution for organizations that want to implement a distributed log management solution to collect archive and analyze network...

Страница 2: ...ch system in your deployment New Device Extensions Functionality You can now modify how a DSM parses logs For example you can use a device extension to detect an event that has missing or incorrect fi...

Страница 3: ...re information on Release 2008 2 refer to the on line documentation STRM Log Management Installation Guide STRM Log Management Administration Guide STRM Log Management Users Guide STRM Log Management...

Страница 4: ...a device requires STRM to forward logs through NSM Note For STRM to correctly process logs from SA and IC the logs should be sent from the devices in WELF format To enable WELF format on the device Un...

Страница 5: ...if your license key expired and you uploaded a new license key STRM Log Management did not provide the option to deploy the new license key Changing the Authentication to STRM Log Management Authentic...

Страница 6: ...nagement 2008 2 the limit of CIDR ranges you can add is approximately 200 depending on the data on your system Now Able to Apply Any IP Filter When Searching for Events Previously when you attempted t...

Страница 7: ...nt 2008 2 this directory structure is properly created Events Appear in Event Viewer and Flows in Flow Viewer After June 30 2008 The Event Correlation Engine license expires on 30 June 2008 This licen...

Страница 8: ...e configuration file and restart services Step 1 Open the configuration file on the machine that uses the custom SSL key normally the Web Server console Step 1 Add the directory path to your custom SS...

Страница 9: ...oller IC device may appear incorrectly as an Enterasys device Workaround Add the Infranet Controller device manually Infranet Controller Device Appears as Secure Access Device An auto discovered Infra...

Страница 10: ...nfiguration change the event query service process restarts and may be temporarily unable to process event searches Workaround Wait between 2 and 3 minutes for the Event Viewer to finish restarting Th...

Страница 11: ...per Networks Inc in the United States and other countries JUNOS and JUNOSe are trademarks of Juniper Networks Inc All other trademarks service marks registered trademarks or registered service marks a...

Отзывы: