STRM Users Guide
G
LOSSARY
227
collector view
Allows you to classify flows based on which QFlow Collector and interface from
which they originated.
credibility
Indicates the integrity of an event or offense as determined by the credibility rating
from source devices. Credibility increases as the multiple sources report the same
event.
custom sentry
You can create a custom sentry to your network has specific monitoring
requirements. A custom sentry can monitor for any required combination of
properties.
custom views
A view that you create that allows you to monitor network traffic specific to your
deployment.
database leaf objects
The end point objects in a hierarchy. At each point in the hierarchy above this point
there would be a parent object that contains the aggregate values of all of the leaf
objects below.
datapoint
Any point on the STRM graphs where data is extracted.
DHCP
See Dynamic Host Configuration Protocol.
DNS
See Domain Name System.
Domain Name
System (DNS)
An on-line, distributed database used to map human-readable machine names
into IP address for resolving machine names to IP addresses.
duplicate flow
When multiple QFlow Collectors detect the same flow, this is referred to as a
duplicate flow. However, in this event, the QFlow Collector drops the flow as a
duplicate so the Classification Engine only receives one report on the flow.
Dynamic Host
Configuration
Protocol (DHCP)
A protocol that allows dynamic assignment of IP addresses to customer premise
equipment.
Encryption
Encryption provides greater security for all STRM traffic between managed hosts.
When encryption is enabled for a managed host, encryption tunnels are created
for all client applications on a managed host to provide protected access to the
respective servers.
Enterprise Security
State
A graphical representation formulated from monitoring the security network data
that creates a single metric that reveals the security state of the network. This is
calculated average of the threat under, threat posing, vulnerability risk, and
network weight metrics.
Enterprise
Vulnerability State
A graphical representation formulated from monitoring the network vulnerability
data that creates a single metric that reveals the vulnerability state of the network.
This is a calculated average of the severity, credibility, and relevance metrics.
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......