STRM Users Guide
122
I
NVESTIGATING
O
FFENSES
Allows you to view all local targets for this offense including:
•
Flag
- Specifies action taken on the offense, for example, if a flag
appears, the offense is marked for follow-up or if a user icon
appears, the offense has been assigned to a user. Point your mouse
over the icon to display additional information.
•
IP/DNS Name
- Specifies the IP address of the local target. If DNS
lookups is enabled in the STRM Administration Console, you can
view the DNS name by pointing your mouse over the IP address or
asset name. For more information, see the
STRM Administration
Guide
.
•
Magnitude
- Specifies the relative importance of the target. The
magnitude bar provides a visual representation of all the correlated
variables of the target. Variables include the vulnerability
assessment risk and threat under.
Threat Under - The value applied to the threat a target is under over
time. This is calculated based on the average weighted value of the
threat under over time.
Vulnerability Risk - The vulnerability assessment risk level (0 to 10)
for the asset where 0 is the lowest and 10 is the highest. This is a
weighted value against all other hosts in your deployment.
Point your mouse to the magnitude bar to display values and the
calculated magnitude.
•
Location
- Specifies the network location of the target.
•
Offenses
- Specifies the number of offenses associated with this
target. This parameter does not appear for remote targets.
•
Attackers/Src
- Specifies the number of attackers associated with
this target. This parameter does not appear for remote targets.
•
Events
- Specifies the number of events associated with this
offense.
•
Last Event
- Specifies the date of the last event.
•
Weight
- Specifies the weight of this target.
If the targets associated with this offense are remote, a seperate
window opens providing information for the remote targets. For more
information on targets, see
Managing Offenses By Targets
.
Table 5-34
Offense Panel Toolbar (continued)
Icon
Function
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......