Introduction - M86 Security M86 User Manual

Web filtering and reporting suite
Hide thumbs Also See for M86:
Table of Contents

Advertisement

S
ECURITY

Introduction

This section of the user guide provides instructions to
administrators on how to utilize data from SWG logs for
monitoring end user Internet and network usage via security
reports.
• Chapter 1: Security Reports - This chapter explains how
• Chapter 2: Security Report Wizard - This chapter
NOTES: If the SR is connected to an SWG running software
version 9.2.X, reports may not be accurate since bypass transac-
tions (e.g. streaming) are not logged for the SR to process.
WARNING: To prevent requested security reports from being
blocked by your email client, be sure to whitelist the SR's source
email address in your email client. The source email address can
be found in System Configuration > Server > SMTP Server
Setting, in the "From Email Address" field.
M86 S
U
G
ECURITY
SER
UIDE
R
EPORTS
to use the four basic security reports: Blocked Viruses,
Security Policy Violations, Traffic Analysis, and Rule
Transactions.
explains how to use the Report Wizard to create your
own customized security reports.
S
R
ECURITY
EPORTS
S
ECTION
S
I
ECTION
NTRODUCTION
817

Advertisement

Table of Contents
loading

Table of Contents