STRM Users Guide
12
A
BOUT
STRM
•
Managing vulnerability assessment and scanners
- Allows you to schedule
scans to keep your vulnerability assessment data up-to-date.
•
Configure sensor devices
- Allows you to configure sensor devices, which
provide events to your deployment through DSMs.
•
Configure flow sources
- Allows you to configure flow sources, such as,
NetFlow or Packeteer.
All configuration updates using the Administration Console are saved to a staging
area. Once all changes are complete, you can deploy the configuration changes or
all configuration settings to the remainder of your deployment.
For more information regarding the STRM Administration Console, see the
STRM
Administration Guide
.
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......