STRM Users Guide
Managing Offenses
83
Assigned to
Specifies the user assigned to this offense.
If not user is assigned, this field indicates Not Assigned. Click
Not Assigned to assign this offense to a user.
Attacker
Summary
Specifies information on details of the attacker that created this
offense. Click
Details
to view additional information.
Magnitude
Specifies the relative importance of the attacker. The magnitude
bar provides a visual representation of all the correlated
variables of the attacker. Variables include the vulnerability
assessment risk and the amount of threat posed.
•
Threat Posed
- The calculated value for this attacker over
time, that indicates how severe the attacker is compared to all
other attackers in your network.
•
Vulnerability Risk
- The vulnerability assessment risk level
(0 to 10) for the asset where 0 is the lowest and 10 is the
highest. This is a weighted value against all other hosts in
your deployment.
Point your mouse to the magnitude bar to display values and the
calculated magnitude.
Description
Specifies the name or IP address of the attacker.
Vulnerabilities
Specifies the number of identified vulnerabilities associated with
this attacker. This value also includes the number of active and
passive vulnerabilities.
Location
Specifies the network location where this attacker is located. If
the location is local, you can click the link to view the networks.
User
Specifies the user associated to this attacker when the attack
began. If no user is identified, the field indicates unknown.
MAC
Specifies the MAC address of the IP address when the offense
began. If the MAC address is unknown, this field is unknown.
Asset Weight
Specifies the asset weight, as assigned using the Asset Profile
function.
Top 5 Categories
Specifies the top 5 global categories, which are part of this
offense, organized by magnitude. Click
Categories
to view
additional information.
Name
Specifies the name of the category.
Magnitude
Specifies the relative importance of the offense. The magnitude
bar provides a visual representation of all the correlated
variables of the attacker. Variables include Relevance, Severity,
and Credibility. Point your mouse to the magnitude bar to values
for the offense and the calculated magnitude.
Local Target Count Specifies the number of local targets associated with this
offense.
Events
Specifies the number of events in this offense that are
associated with this category.
Table 5-3
Offense Details Panel (continued)
Parameter
Description
Содержание SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - LOG MANAGEMENT ADMINISTRATION GUIDE REV 1
Страница 13: ...STRM Users Guide Assets 7 Note For more information see Chapter 8 Managing Assets...
Страница 100: ...STRM Users Guide 94 INVESTIGATING OFFENSES...
Страница 138: ......
Страница 226: ......