Managing Offenses By Targets
106
Viewing Offenses By Targets
106
Searching Targets
112
Managing Offenses By Networks
114
Viewing Offenses By Networks
114
Searching Networks
124
Marking an Item For Follow-Up
125
Adding Notes
125
Configuring Notification
126
Managing Network Anomalies
127
Viewing Network Anomaly Offenses
127
Closing Offenses
129
Forwarding Network Anomaly Offenses
130
Exporting Offenses
131
6
U
SING
THE
E
VENT
V
IEWER
Using the Event Viewer Interface
134
Using the Toolbar
134
Using the Right-Click Menu Options
134
Viewing Events
135
Viewing Normalized Events
135
Viewing Raw Events
139
Viewing Aggregate Normalized Events
140
Searching Events
145
Searching Events
145
Deleting Saved Searches
148
Viewing the Associated Offense
148
Modifying Event Mapping
149
Tuning False Positives
151
Exporting Events
152
7
U
SING
THE
F
LOW
V
IEWER
Using the Flow Viewer Interface
154
Using the Toolbar
154
Using the Right-Click Menu Options
154
Viewing Flows
155
Viewing Flows
155
Viewing Aggregated Flows
158
Using the Search
164
Searching Flows
164
Deleting Saved Searches
167
Exporting Flows
167
8
M
ANAGING
A
SSETS
Searching Asset Profiles
169
Adding an Asset Profile
175
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......