STRM Users Guide
10
U
SING
TNC R
ECOMMENDATIONS
Trusted Network Computing (TNC) recommendations allow you to restrict or deny
network access to users based on user name or other credentials. The TNC
recommendation uses the asset profile and user identify data collected by STRM.
You must have appropriate network access to use the TNC recommendations
function.
Once you create TNC recommendations and a matching recommendation is found
during a request from an access controller, STRM supplies the most severe
recommendation. For example, if two recommendations exist for a user, the first
includes a restrict recommendation and the second with a deny recommendation,
STRM recommends the deny action.
Note:
Before you create TNC recommendations, you must install the Integrity
Measurement Collector (IMC) and the Integrity Measurement Verifier (IMV) plug-in
according to the TNC architecture. For more information, see the Integrating TNC
Technical Note.
This chapter includes:
•
Configuring TNC Recommendations
•
Removing TNC Recommendations
Configuring TNC
Recommendations
To configure TNC recommendations:
Step 1
On any IP address or asset name, use the right-mouse button (right-click) to
display the right-click menu.
Step 2
Select
TNC Recommendations
.
The TNC Recommendation window appears.
Note:
If the TNC Recommendations option is not active, you can enable this
functionality using the System Settings option in the STRMAdministration Console.
For more information, see the STRM Administration Guide.
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......