530-025628-01
STRM Log Management Overview
1
STRM L
OG
M
ANAGEMENT
R
ELEASE
N
OTES
R
ELEASE
2008.2
J
UNE
2008
Juniper Networks is pleased to introduce STRM Log Management 2008.2. This
release provides you with several resolved issues and eclonhanced functionality.
This document includes:
•
STRM Log Management Overview
•
New and Updated Functionality
•
Related Documentation
•
Contacting Customer Support
•
Supported Devices and OS Versions
•
Supported Java and Browser Software
•
Resolved Issues
•
Known Issues and Limitations
Note: If your current deployment includes ISS SiteProtector, contact Juniper
Networks Customer Support before you install STRM Log Management.
STRM Log
Management
Overview
Juniper Networks Security Threat Response Manager Log Management Only
(STRM LM) provides a comprehensive log management solution for organizations
that want to implement a distributed log management solution to collect, archive,
and analyze network and security event logs. Log management has emerged as a
required part of an organization’s ability to deliver security best practices and meet
specific auditing and reporting requirements of government regulations, including
PCI, Sarbanes-Oxley, HIPAA, and FISMA.
STRM LM provides numerous advantages over other log management solutions
including:
•
Easy-to-deploy turnkey log management solution—Architecture provides a
simple and easy-to-use solution for secure and efficient log management.
•
Scalable distributed log collection and archival
—
Appliance architecture scales
to support any size enterprise network.
•
Simple policy-driven event correlation
—
Hundreds of useful out-of-the box
correlation rules provide immediate value.