S
ECURITY
Introduction
This section of the user guide provides instructions to
administrators on how to utilize data from SWG logs for
monitoring end user Internet and network usage via security
reports.
• Chapter 1: Security Reports - This chapter explains how
• Chapter 2: Security Report Wizard - This chapter
NOTES: If the SR is connected to an SWG running software
version 9.2.X, reports may not be accurate since bypass transac-
tions (e.g. streaming) are not logged for the SR to process.
WARNING: To prevent requested security reports from being
blocked by your email client, be sure to whitelist the SR's source
email address in your email client. The source email address can
be found in System Configuration > Server > SMTP Server
Setting, in the "From Email Address" field.
M86 S
U
G
ECURITY
SER
UIDE
R
EPORTS
to use the four basic security reports: Blocked Viruses,
Security Policy Violations, Traffic Analysis, and Rule
Transactions.
explains how to use the Report Wizard to create your
own customized security reports.
S
R
ECURITY
EPORTS
S
ECTION
S
I
ECTION
NTRODUCTION
817