Reports
22
Enterprise Security State
22
Enterprise Vulnerability State
23
System Summary
24
Adding Items
24
3
M
ANAGING
Y
OUR
N
ETWORK
A
CTIVITY
Using the Network Surveillance Menu
25
Global Views
25
Asset Map
26
Bookmarks
27
QRL Options
27
Viewing Network Activity
28
Interpreting the Graphs
28
Changing the View
30
Changing Flow Attributes
32
Changing Traffic Location
33
Investigating Traffic Using TopN
34
Viewing the TopN Information
34
Investigating Traffic
35
Investigating Flows
36
4
M
ANAGING
S
ENTRIES
About Sentries
40
Types of Sentries
40
Viewing Sentries
42
Creating a Sentry
43
Creating a Security/Policy Sentry
44
Creating a Behavior Sentry
49
Creating an Anomaly Sentry
56
Creating a Threshold Sentry
61
Creating a Custom Sentry
66
Editing a Sentry
72
5
I
NVESTIGATING
O
FFENSES
Using the Offense Manager
78
Managing My Offenses
78
Managing Offenses
79
Viewing Offenses
79
Searching Offenses
88
Removing Offenses
90
Assigning Offenses to Users
92
Viewing Offense By Category
93
Managing Offenses By Attacker
97
Viewing Offenses by Attacker
97
Searching Attackers
104
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......