STRM Users Guide
8
M
ANAGING
A
SSETS
STRM automatically discovers assets (servers and hosts) operating on your
network, based on passive QFlow data as well as vulnerability data allowing STRM
to build an asset profile. Asset profiles display what services are running on each
asset. This profile data is used for correlation purposes to help reduce false
positives, for example, if an attack occurs trying to exploit a specific service
running on a specific asset, STRM can determine if the asset is vulnerable to this
attack by correlating the attack to the asset profile. Using the Assets tab, you can
view all the learned assets or search for specific assets to view there profiles.
This chapter includes:
•
Searching Asset Profiles
•
Adding an Asset Profile
•
Editing an Asset
•
Deleting Assets
•
Importing Asset Profiles
•
Exporting Assets
Searching Asset
Profiles
Searching asset profiles allows you to filter all existing records from host profiles,
assets, and identify tables. To search asset profiles:
Step 1
Click the
Assets
tab.
The Assets window appears.
Step 2
In the navigation menu, click
Asset Profiles
.
The Asset Profile Search window appears.
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......