Login:
Votes - , Average rating: ( )

User manual 8e6 Technologies, model Threat Analysis Reporter TAR HL/SL/MSA

Manafacture: 8e6 Technologies
File size: 915.44 kb
File name: 2c56bb90-ca9d-4824-905c-bd3daf30e076.pdf

Language of manual:en

The document is loading, please wait
The document is loading, please wait

manual abstract


.................................................................................................... 12 Step 2: Add a New Alert................................................................................................ 12 Step 3: Specify Alert Components. ............................................................................. 13 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CONTENTS CHAPTER 5: VIEW A URL TREND REPORT ....................................................14 Step 1: Access Trend Charts. ...................................................................................... 14 Step 2: Change the Time Span. ................................................................................... 14 CHAPTER 6: MONITOR BANDWIDTH GAUGES .................................................15 Step 1: Select Bandwidth and Outbound.................................................................... 15 Step 2: Select the FTP Protocol Gauge....................................................................... 15 Step 3: Select Port 21 Child Gauge. ............................................................................ 16 Step 4: View the User Summary. ................................................................................. 16 Step 5: View Port Traffic............................................................................................... 17 CHAPTER 7: VIEW A BANDWIDTH TREND REPORT .........................................18 Step 1: Select Bandwidth and Trend Chart. ............................................................... 18 Step 2: View Bandwidth Trend Chart Data. ................................................................ 18 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE THREAT ANALYSIS REPORTER EVALUATION GUIDE OVERVIEW THREAT ANALYSIS REPORTER EVALUATION GUIDE Overview The Threat Analysis Reporter helps administrators manage internal Web-based threats by monitoring Internet usage information by user in real-time, and by providing proactive remediation tools to enforce the organization’s Acceptable Use Policy. Note to Evaluators Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appliance. Your interest in our company and product is greatly appreciated. This Evaluation Guide Is designed to provide product evaluators an efficient way to install, configure and exercise the main product features of the TAR. Install, Configure, and Test TAR To install the TAR appliance, configure the server, and to test the unit to ensure that reporting is operational, please refer to the step-by-step instructions in the Threat Analysis Reporter Quick Start Guide provided inside the carton containing the chassis. Please note that prior to reviewing TAR, the R3000 Internet Filter must already be installed; this appliance is required for sending logs to the Reporter. See the R3000 Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter. 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 1: ACCESS THE TAR WEB CLIENT STEP 1: LAUNCH IE CHAPTER 1: ACCESS THE TAR WEB CLIENT Step 1: Launch IE From your workstation, launch Internet Explorer to open an IE browser window. NOTE: If pop-up blocking software is installed on the workstation, it must be disabled. Information about disabling pop-up blocking software can be found in the TAR User Guide Appendix A: Disable Pop-up Blocking Software. Step 2: Type in the URL In the Address field of the browser window, type in the URL for the TAR server: (in which ‘x.x.x.x’ represents the IP address). This action opens the TAR login window, which serves as a portal for administrators to log into TAR. Login window Step 3: Log into the Application 1. In the Username field, type in your username. If you are logging in as the global administrator, enter the username registered during the quick start wizard procedures. If you are logging in as a group administrator, enter the username set up for you by the global administrator. 2. In the Password field, type in your password. If you are logging in as the global administrator, enter the password registered during the quick start wizard procedures. If you are logging in as a group administrator, enter the password set up for you by the global administrator. Asterisks display for each character entered. 3. Click the Log In button to open the application that displays the URL dashboard gauge view in the right panel by default. The navigation panel displays to the left, and in the panel above the system time and date display (in the HH:MM:SS/ MM.DD.YYYY format) beside the Logout button: 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 1: ACCESS THE TAR WEB CLIENT STEP 3: LOG INTO THE APPLICATION URL dashboard with URL gauges 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 2: DRILL DOWN INTO A URL GAUGE STEP 1: HOW TO READ A GAUGE CHAPTER 2: DRILL DOWN INTO A URL GAU...

Other models in this manual:
Network Equipment - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Network Equipment - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Network Equipment - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)

Reviews



Your review
Your name:
Please, enter two numbers from picture:
capcha





Category