STRM Users Guide
I
NDEX
A
access category
95
Administration Console
overview
11
all offenses
79
annotations
top 5
85
anomaly sentry
41
creating
56
application category
95
Applications View
31
asset
adding
175
deleting
178
editing
176
importing
179
searching
169
asset map
about
26
assets
overview
6
attacker
97
summary
83
attacker threat posing
22
attackers
searching
104
authentication category
95
auto learn
47
B
behavior sentry
40
creating
49
behavioral category
95
bookmarks
about
27
branding reports
218
By Attacker
97
By Category
93
C
categories
top 5
83
category
93
access
95
authentication
95
CRE
95
custom
96
DoS
95
exploit
95
malware
95
network anomalies
95
policy
95
potential exploit
95
recon
95
SIM audit
95
suspicious
95
system
96
VIS host discovery
96
conventions
1
correlate events
77
CRE category
95
custom category
96
custom sentry
creating
66
customer support
contacting
2
D
dashboard
13
about
13
adding items
24
attacker threat posing
22
attackers and targets
19
Enterprise Security State
22
events
20
events by severity
20
events over time
20
network threat posing
22
network threat under
22
network weight
23
Offense Manager
18
offenses
18
overview
4
reports
22
summary
24
target threat under
22
top category types
19
top devices
20
TopN
17
traffic
16
using
15
vulnerability risk
23
detaching an item
15
DoS category
95
E
Enterprise Security State
22
Enterprise Vulnerability State
23
event mapping
149
event viewer
event mapping
149
false positive tuning
151
overview
5
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......