STRM Users Guide
Managing Offenses By Targets
113
Step 4
Enter values for the parameters:
Step 5
Click
Search
.
The search results appear. The search results consider all targets in the database,
including targets without associated active offenses.
Table 5-24
Target Search Parameters
Item
Description
Target IP
Specify the IP address of the target.
Magnitude
Using the drop-down list box, select if you wish to search magnitude
equal to, less than, or greater than the configured value. The range is
0 to 10.
Vulnerability
Risk
Using the drop-down list box, select if you wish to search vulnerability
risk equal to, less than, or greater than the configured value. The
range is 0 to 10.
Threat Under
Using the drop-down list box, select if you wish to search the amount
of threat the target is experiencing to be equal to, less than, or
greater than the configured value.
Event Count
Using the drop-down list box, select if you wish to search the event
count equal to, less than, or greater than the configured value.
Start Date
Between
Select the check box if you wish to search targets whose existence
was first recorded in the STRM database during a certain time period.
Once you select the check box, use the calendar to select the dates
you wish to search.
Last Event
Between
Select the check box if you wish to search targets that the last
detected event occurred within a certain time period. Once you select
the check box, use the calendar to select the dates you wish to
search.
Sort by
Using the drop-down list box, select the parameter you wish to use to
sort the search results. Also, select the Asc (Ascending) or Desc
(Descending) parameters to determine how the search results
appear in the list.
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......