STRM Users Guide
Managing Offenses By Networks
119
The List of Targets panel provides the following functions:
Step 6
To view a list of offenses associated with this attacker, click
Offenses.
Magnitude
Specifies the relative importance of this target. The magnitude
bar provides a visual representation of all the correlated variables
of the target. Point your mouse to the magnitude bar to values for
the offense and the calculated magnitude. Variables include the
vulnerability assessment risk and the threat under.
•
Threat Under
- The value applied to the threat a target is
under over time. This is calculated based on the average
weighted value of the threat posing over time.
•
Vulnerability Risk
- The vulnerability assessment risk level (0
to 10) for the asset where 0 is the lowest and 10 is the highest.
This is a weighted value against all other hosts in your
deployment.
Location
Specifies the location of the target.
Offenses
Specifies the number of offenses associated with this target.
Attacker/Src
Specifies the number of attackers associated with this target.
Events
Specifies the number of events associated with this offense.
Last Event
Specifies the date of the last event.
Weight
Specifies the weight of the asset.
Table 5-32
Target Panel Toolbar
Icon
Function
Allows you to view a list of offenses for this attacker. See
Step 6
.
Allows you to view a list of attackers. For more information, see
Table 5-29
.
Allows you to search for targets of this attacker. To search targets:
1
Click
Search
.
2
Enter values for the parameters:
Target Network
- Using the drop-down list box, select the network
you wish to search.
Magnitude
- Using the drop-down list box, select whether you wish
to search for magnitude Equal to, Less than, or Greater than. Enter a
magnitude value you wish to search.
Sort by
- Using the drop-down list box, select how you wish to sort
the search results.
3
Click
Search
.
The list of local targets appears. For more information on results, see
table
Table 5-11
.
Table 5-31
List of Targets (continued)
Parameter
Description
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......