STRM Users Guide
I
NDEX
239
by category
93
closing
90
,
91
closing all filtered offenses
90
closing filtered offenses
92
hiding
90
managing
79
removing
90
searching
88
viewing
79
viewing dismissed
91
P
Package
40
pausing the interface
10
policy category
95
potential exploit category
95
Q
STRM
overview
3
using
9
QRL definition
33
QRL options
about
27
R
raw events
139
recon category
95
refreshing the interface
10
removing an item
15
report templates
default
216
reports
about
181
brand
218
chart type
196
container
188
content
188
creating
188
creating a template
189
default templates
216
distribution channels
193
editing
216
formatting
193
generate
217
graph type
214
grouping
184
assigning
188
copying
186
creating
185
deleting
187
editing
186
layout
188
layout preview
193
navigation menu
182
overview
9
scheduling options
189
selecting a container
192
selecting the layout
191
summary
195
template
189
time series chart
201
toolbar
183
top attackers chart
205
top offenses chart
207
top targeted assets chart
209
using the interface
182
viewing
183
S
security/policy sentry
41
creating
44
sentry
about
39
anomaly
about
41
creating
56
behavior
about
40
creating
49
creating
43
custom
42
creating
66
editing
72
Logic Unit
40
Package
40
security/policy
about
41
creating
44
threshold
about
42
creating
61
types
40
variables
74
viewing
42
sentry layers
75
SIM audit category
95
SNMP trap
48
sorting results
9
suspicious category
95
system category
96
T
target threat under
22
targets
106
searching
112
top 5
84
Threats View
31
threshold sentry
42
creating
61
time series
201
TNC recommendations
221
configuring
221
removing
223
top attackers
205
top attackers chart
205
top offenses
207
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......