Login:
Votes - , Average rating: ( )

User manual ADC, model Threat Analysis Reporter TAR HL/SL/MSA

Manafacture: ADC
File size: 915.44 kb
File name: 2c56bb90-ca9d-4824-905c-bd3daf30e076.pdf

Language of manual:en

The document is loading, please wait
The document is loading, please wait

manual abstract


These gauges are designed to provide an intuitive reminder when a specific category gauge is experiencing abnormal levels of activity so the administrator can react quickly. Step 2: View Child Gauges Sometimes a single child gauge is responsible for driving a parent gauge’s score. To view child gauges, you can either double-click the parent gauge or right-click the parent gauge and then select “View Gauge Details”. In this example, select the “Security” gauge. Select the Security parent gauge Performing either of the two aforementioned actions on this parent gauge will open a window containing all child gauges associated with that gauge. 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 2: DRILL DOWN INTO A URL GAUGE STEP 3: VIEW A LIST OF USERS AFFECTING A CHILD GAUGE Step 3: View a List of Users Affecting a Child Gauge Double-click the child gauge to open a window containing a list of users who are responsible for driving that gauge’s score. In this example, double-click the “Spyware” child gauge. Open the child gauges window Step 4: View an Individual User’s Gauge Activity In the Spyware window, select the top name from the user list and click “User Summary” to get a complete view of all activity for that user. This will help determine if the user is just abusing a single category or has high activity in other gauges as well. View a list of end users who are responsible for a gauge’s activity 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 2: DRILL DOWN INTO A URL GAUGE STEP 5: TAKE ACTION ON AN INDIVIDUAL’S ACTIVITY Step 5: Take Action on an Individual’s Activity In the Individual User View window, select the “Security” gauge from the list and then click the “Category View” button to view the hits and score the user obtained for each Security sub-category. The Individual User View window also lets you lock out the user from further accessing a category. This action is called a “manual lockout.” Lockouts can be defined from 30 minutes to eight hours or set for an unlimited amount of time until the administrator manually unlocks the user. View a summary of an end user’s activity NOTE: There is also a way to automatically lock out the user that will be demonstrated later in this document. Step 6: View Category Details In the View by Hits window for the Security category, select the “Spyware” subcategory and then click the “URL Details” button to drill down into the actual pages visited by this specific user in this specific category. View a list of sub-categories 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 2: DRILL DOWN INTO A URL GAUGE STEP 7: VIEW THE ACTUAL WEB PAGE VISITED BY THE USER Step 7: View the Actual Web Page Visited by the User You can now view the full URL details for this specific user. In this example, select the first URL in the list and then click “Open URL” to open the actual Web page the end user visited. View URL Details 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 3: CREATE A NEW URL GAUGE STEP 1: SELECT THE GAUGES MENU ITEM CHAPTER 3: CREATE A NEW URL GAUGE Step 1: Select the Gauges Menu Item In order to create a new custom gauge, select the “Gauges” menu item from the left-hand menu. This action will open a pop-up window (see Step 2). Select Gauges from left panel Step 2: Add a Gauge Group Click on the “Add Gauge Group” button to set parameters for the gauge. Add a new gauge 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 3: CREATE A NEW URL GAUGE STEP 3: DEFINE THE GAUGE Step 3: Define the Gauge This section will explain how to set parameters for the new custom gauge. Define components for the gauge 1. Type in a name in the “Group Name” field (name it whatever you like). 2. Put in ‘0’ in the “Lower Limit Value” field. 3. Put in ‘1000’ in the “Upper Limit Value” field. NOTE: If you do not know what number to set for the upper limit threshold, you can get a better idea by running a URL Trend Report for “One Day” to see the normal level of activity for that category and then set the threshold slightly above that level. See Chapter 5: View a URL Trend Report for details on how to use the trend report. 4. Put ’60’ in the “Timespan” field. 5. Add “Adware”, “Alcohol” and “Art” into the “Assigned Categories” field by selecting each category and then clicking the “Add” button. TIP: If you make a mistake, just click on the category you do not want and click the “Remove” button. 6. Once all of this is completed, click the “Next” button. NOTE: The “Inclusions” button is used to view a subset of users such as the marketing department or classroom 5A. For the sake of this demo, do not change the inclusions default of “All” users. 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 3: CREATE A NEW URL GAUGE STEP 4: ADVANCED SETTINGS Step 4: Advanced Settings For the purposes of this demonstration, click the “Next” button to open a window where you configure advanced settings. S...

Other models in this manual:
Network Equipment - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Network Equipment - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Network Equipment - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)

Reviews



Your review
Your name:
Please, enter two numbers from picture:
capcha





Category