Juniper STRM 2008-2 - TECHNICAL NOTE CHANGING NETWORK SETTING 6-2008 Скачать руководство пользователя страница 12

530-025618-01

12

STRM Release Notes

Offense Manager

An IP Address Previously Identified as a Remote Attacker Can Not Be 
Created as an Offense When Creating a New Network

Even if your network hierarchy is not defined, STRM can start generating offenses. 
However, STRM records all generated offenses as remote offenses since no local 
systems are defined in your network hierarchy. If this occurs, any IP address that 
has been previously defined as a remote attacker can not be created as an offense 
when defining your network. 

Workaround

: You must restart the Event Correlation System (ECS). From the 

command prompt, type 

service ecs restart

. Also, make sure your network 

hierarchy is defined. 

Overlapping CIDR(s) in Network Hierarchy Configuration Allows Users to 
View Assets to Which They Have No Access

If your network hierarchy configuration includes overlapping CIDR ranges, a STRM 
non-administrative user is able to view assets for which they have no access. They 
can view a list of the restricted assets by clicking 

Search

 or 

Show All

 in the Asset 

Profile window of the Offense Manager. However, an error appears if the user 
attempts the edit the asset or view detailed information. 

Workaround

: None. 

Viewing a List of Attackers May Display Blank Pages

The Offense Manager allows you to view a list of attackers for a network. If your 
system includes closed offenses that have been removed from the database, the 
list of attackers may not return the same number of results as the attacker count. If 
the list of attacker results are returned over multiple pages, there may be several 
blank pages at the end of the results. All results are included in the output. 

Workaround

: Click on the previous page to view information. 

Event Viewer

Events Are Marked "Unknown" in Event Viewer

Events that arrive from a device that has not yet been auto-discovered are marked 
"Unknown." This is normal behavior.

Workaround

: Wait for auto-discovery to detect the device. 

Event Viewer Does not Respond to Searches

After a configuration change, the event query service process restarts and may be 
temporarily unable to process event searches. 

Workaround

: Wait between 2 and 3 minutes for the Event Viewer to finish 

restarting. Then try your search again.

Accessing Right-Click Menu in Event Viewer Causes Java Error

Using the right mouse button (right click) in the Event Viewer allows you to access 
additional menu options. If pop-ups are disabled in your web browser, a Java error 
occurs. 

Workaround

: Enable pop-ups in your web browser. 

Содержание STRM 2008-2 - TECHNICAL NOTE CHANGING NETWORK SETTING 6-2008

Страница 1: ...y and improve policy monitoring with a modest investment in time and resources STRM goes beyond traditional security information event management SIEM products and network behavior analysis NBA products to create a command and control center that delivers Threat Management STRM detects threats that would otherwise be missed by product or operational silos Log Management STRM responds to the right ...

Страница 2: ...al DSM is associated with an asset profile allowing you to track user identity data and associate that information to an asset profile User Roles Enhancement Administrative users can now be assigned additional controls including View Administrator Allows Administrative users to modify STRM Views Administrator Management Allows Administrative users to create and edit other administrative accounts S...

Страница 3: ...0 025618 01 Related Documentation 3 Adaptive Log Exporter Users Guide Managing Sensor Devices Guide Managing Vulnerability Assessment AQL Flow and Event Query CLI Guide SNMP Agent Upgrading to STRM 2008 2 ...

Страница 4: ...rmat on the device Under System Logs Events Settings select the WELF filter for the syslog STRM server entry in this table Supported Java and Browser Software STRM supports the following versions of Java and browsers Java version 1 5 and later Internet Explorer version 7 Firefox version 2 0 Resolved Issues This section describes the resolved issues in STRM 2008 2 Changing Network Settings No Longe...

Страница 5: ...ive Directory to STRM Authentication you were required configure access for users on the system before they are able to login to STRM No message appeared in STRM stating this requirements In STRM 2008 2 you must define passwords for all users that do not have a password defined Updating License Key When Using Internet Explorer 6 No Longer Causes Error Previously when you updated your license key u...

Страница 6: ... appearing in the Generated Reports interface with Admin as the listed owner This no longer occurs Now Able to Add 200 CIDRS for a Network Object Previously the limit of CIDR range s you could add to the network object was 70 If you attempted to add more than 70 CIDR range s an error appeared In STRM 2008 2 the limit of CIDR ranges you can add is approximately 200 depending on the data on your sys...

Страница 7: ...uration Now Create Proper Directory Structure Previously when restoring configuration information on a new Console system the store db directory was not properly created In STRM 2008 2 this directory structure is properly created Unioned Flow Details Now Retrieving Correct Flow Information Using the Display drop down list box in the Flow Viewer you are able to view flows using one of the available...

Страница 8: ...profile data By default the list includes the following views 1 2 15 and 16 If you set a view to 0 an error appears in the log files Also if you upgrade to STRM 2008 2 any Asset Profile View set to 0 is automatically changed to a value of 16 Workaround None During a Restart an Error May Appear Regarding the Tomcat Server Any changes to STRM using the web based system administration interface requi...

Страница 9: ...covered Infranet Controller IC device may appear incorrectly as a Secure Access SA device Workaround Add the Infranet Controller device manually Exporting Information Using CSV XML Export may be Blocked Using Internet Explorer 7 If you wish to download information such as events assets or flows using the STRM Export function you can select the Notify When Done option that enables the browser to no...

Страница 10: ...ontext restart Performing an Automatic Update Does Not Deploy All Changes When you update your system using the Auto Update Configuration window in the STRM Administration Console the changes are not enforced throughout your deployment This results in updated contents do not appearing in the deployment Workaround From the Administration Console Menu select Configurations Deploy All to enforce the ...

Страница 11: ...ng the Chat Mail and Web components in an Application View each data set is different however since they are based on the same network STRM interprets the data as one displaying each component with the same color Workaround None Sentry Wizard Sensitivity Slider Is Reading From Lowest To Highest When setting the alert sensitivity in the Sentry Wizard the slider has a reading of 0 to 100 Increasing ...

Страница 12: ...t or view detailed information Workaround None Viewing a List of Attackers May Display Blank Pages The Offense Manager allows you to view a list of attackers for a network If your system includes closed offenses that have been removed from the database the list of attackers may not return the same number of results as the attacker count If the list of attacker results are returned over multiple pa...

Страница 13: ...e click on a flow is disabled Workaround Using the search function in the Flow Viewer search flows based on the union flows that you wish to isolate by using the right mouse button right click on the source destination IP address ports and protocols Once the details of the flows appears select the None option from the Display drop down list box Reports Size of Pie Charts in Reports is Dynamic When...

Страница 14: ...Networks Inc in the United States and other countries JUNOS and JUNOSe are trademarks of Juniper Networks Inc All other trademarks service marks registered trademarks or registered service marks are the property of their respective owners All specifications are subject to change without notice Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to...

Отзывы: