M86 Security 350 Installation Manual

Web filter and reporter
Hide thumbs Also See for 350:
Table of Contents

Advertisement

Quick Links

M86 Web Filter and Reporter
INSTALLATION GUIDE
Models: 350, 550
Software Version: 5.0.10
Document Version: 05.29.12

Advertisement

Table of Contents
loading

Summary of Contents for M86 Security 350

  • Page 1 M86 Web Filter and Reporter INSTALLATION GUIDE Models: 350, 550 Software Version: 5.0.10 Document Version: 05.29.12...
  • Page 2 Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connec- tion with the furnishing, performance, or use of this manual or the examples herein.
  • Page 3: Table Of Contents

    ONTENTS M86 WFR A .............1 PPLIANCE NTRODUCTION About this Document...................... 2 Conventions Used in this Document................2 ..................3 ERVICE NFORMATION M86 Technical Support Call Procedures..............3 ..............4 RELIMINARY ETUP ROCEDURES Unpack the Unit from the Carton................... 4 Select a Site for the Server..................... 5 300 Series Server Setup Procedures ..................
  • Page 4 ONTENTS Quick Start menu screen ......................21 Quick Start menu: administration menu ................. 22 Change filtering mode ..................... 23 Configure network interface LAN1 ................... 23 Configure network interface LAN2 ................... 23 Configure default gateway ....................23 Configure DNS servers ....................23 Configure host name .......................
  • Page 5 ONTENTS Step 4: Generate SSL Certificate................. 44 Generate a Self-Signed Certificate for the WFR ..............44 IE Security Certificate Installation Procedures ............... 45 Accept the Security Certificate in IE ................45 Windows XP or Vista with IE 8 or 9................45 Windows 7 with IE 8 or 9....................
  • Page 6 ONTENTS D. Warn option with low filter settings ................77 E. Warn-strike ......................... 77 F. P2P patterns ....................... 77 G. IM patterns ......................... 78 H. Game patterns ......................78 I. Streaming Media patterns ................... 78 J. Remote Access patterns ....................79 K.
  • Page 7 ONTENTS Step B: Investigate a user’s activity in a specified gauge ..........104 Step C: Investigate the user’s Internet activity in other gauges ........105 III. Create a gauge exercise ....................106 Step A: Access the Add/Edit Gauges panel ..............106 Step B: Add a URL Gauge ....................107 IV.
  • Page 8 ONTENTS Electromagnetic Compatibility (EMC) ..................137 Federal Communications Commission (FCC) Class A Notice (USA) ........137 FCC Declaration of Conformity ....................137 Electromagnetic Compatibility Class A Notice ..............137 Industry Canada Equipment Standard for Digital Equipment (ICES-003) .....137 EC Declaration of Conformity ....................138 European Community Directives Requirement (CE) .............138 ......................139 NDEX viii...
  • Page 9: M86 Wfr Appliance Introduction

    M86 WFR A PPLIANCE NTRODUCTION M86 WFR A PPLIANCE NTRODUCTION Thank you for choosing to install and evaluate the M86 Web Filter and Reporter appliance. M86’s Web Filtering and Reporting Suite (WFR) consists of the best in breed of the M86 Professional Edition, consolidated into one unit. M86 Web Filter offers an enhanced solution for Internet filtering on a network.
  • Page 10: About This Document

    • Introduction - This section is comprised of an overview of the WFR product and how to use this document • Service Information - This section provides M86 Security contact information • Preliminary Setup Procedures - This section includes instructions on how to physically set up the WFR appliance in your network environment •...
  • Page 11: Service Information

    Any initial hardware setup problem that cannot be resolved at your internal organi- zation should be referred to an M86 Security solutions engineer or technical support representative. For technical assistance or warranty repair, please visit http://www.m86security.com/support/ .
  • Page 12: Preliminary Setup Procedures

    Carefully unpack the unit from the carton and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to M86 Security. The carton should contain the following items: • 1 Web Filter and Reporter appliance (WFR) •...
  • Page 13: Select A Site For The Server

    RELIMINARY ETUP ROCEDURES ELECT A ITE FOR THE ERVER Select a Site for the Server The server operates reliably within normal office environmental limits. Select a site that meets the following criteria: • Clean and relatively free of excess dust. •...
  • Page 14: Rack Mount The Server

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount the Server Rack Setup Precautions WARNING: Before rack mounting the server, the physical environment should be set up to safely accommodate the server. Be sure that: • The weight of all units in the rack is evenly distributed. Mounting of the equip- ment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading.
  • Page 15: Rack Mount Instructions For 500 Series Servers

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions for 500 Series Servers Rack Setup Suggestions • Determine the placement of each component in the rack before you install the rails. • Install the heaviest server components on the bottom of the rack first, and then work up.
  • Page 16: Install The Slide Assemblies To The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Slide Assemblies to the Rack 1. After you have installed the short and long brackets to the outer slides, you are ready to install the whole slide assemblies (outer slides with short and long brackets attached) to the rack.
  • Page 17: Install The Chassis Into The Rack

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack 1. Push the inner slides, which are attached to the chassis, into the grooves of the outer slide assemblies that are installed in the rack as shown below: 2.
  • Page 18: Install The Bezel On The 500 Series Chassis

    RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Bezel on the 500 Series Chassis After rack mounting a 500 series server, the bezel should be installed on the front end of the chassis. NOTE: This portion of the installation process requires you to unpack the bezel. The bezel has been packaged separately from the unit to prevent damage during shipping.
  • Page 19: Check The Power Supply

    • In geographic regions that are susceptible to electrical storms, M86 Security highly recommends plugging the AC power cord for the server into a surge suppressor.
  • Page 20: General Safety Information

    WARNING: If the server is used in a manner not specified by the manufacturer, the protection provided by the server may be impaired. WARNING: M86 Security is not responsible for regulatory compliance of any server that has been modified. Altering the server’s enclosure in any way other than the installation operations specified in this document may invalidate the server’s safety certifications.
  • Page 21: Ac Power Cord And Cable Precautions

    RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION AC Power Cord and Cable Precautions WARNING: • The AC power cord for the server must be plugged into a grounded, power outlet. • Do not modify or use a supplied AC power cord if it is not the exact type required in the region where the server will be installed and used.
  • Page 22: Motherboard Battery Precautions

    RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION Motherboard Battery Precautions CAUTION: The battery on the motherboard should not be replaced without following instruc- tions provided by the manufacturer. Only qualified service personnel should replace batteries. The battery contains energy and, as with all batteries, a malfunction can cause heat, smoke, or fire, release toxic materials, or cause burns.
  • Page 23: Install The Server

    1: S NSTALL THE ERVER ETUP ROCEDURES NSTALL THE ERVER Step 1: Setup Procedures This step requires you to set up parameters for the WFR to function on the network. You have the option of using the text-based Quick Start setup procedures described in Step 1A, or the LCD panel setup procedures described in Step 1B.
  • Page 24: Step 1A: Quick Start Setup Procedures

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Step 1A: Quick Start Setup Procedures Link the Workstation to the WFR Monitor and Keyboard Setup A. Connect the PC monitor and keyboard cables to the rear of the WFR chassis. B.
  • Page 25: Power On The Wfr

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Power on the WFR Power up a 300 Series Model A. Make sure the power adapter is plugged into the back of the chassis and connected to the power cord. B. Plug the power cord into a power source with an appropriate rating. WARNING: It is strongly suggested you use an uninterruptible power supply.
  • Page 26: Hyperterminal Setup Procedures

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES HyperTerminal Setup Procedures If using a serial console, follow these procedures on a Windows XP machine to create a HyperTerminal session. NOTE: HyperTerminal is no longer included with Windows as of Microsoft’s Vista system. Please note on Microsoft’s Web page “What happened to HyperTerminal?”...
  • Page 27 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES C. At the Connect using field, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, displaying the Port Settings tab: D.
  • Page 28 1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES F. In the HyperTerminal session window, go to File > Properties to open the Prop- erties dialog box, displaying the Connect To and Settings tabs: G. Click the Settings tab, and at the Emulation menu select “VT100”. H.
  • Page 29: Login Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Login screen The login screen displays after powering on the WFR using a monitor and keyboard, or after creating a HyperTerminal session. NOTES: If using a HyperTerminal session, the login screen will display with black text on a white background.
  • Page 30: Quick Start Menu: Administration Menu

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Quick Start menu: administration menu A. At the Press the number of your selection prompt, press 2 to select the “Quick Start Setup” process. The Quick Start menu takes you to the following configuration screens to make entries: •...
  • Page 31: Change Filtering Mode

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Change filtering mode A. From the Quick Start menu, press 3 to go to the Filter mode configuration screen. B. Select a filter mode (Invisible, Router, or Firewall) using up-arrow and down- arrow keys.
  • Page 32: Configure Host Name

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Configure host name A. From the Quick Start menu, press 8 to go to the Configure host name screen. B. At the Enter host name prompt, type in the host name and press Enter. C.
  • Page 33: Non-Quick Start Procedures Or Settings

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Non-Quick Start procedures or settings The options described below do not pertain to the quick start setup process. Reboot system A. From the Quick Start menu, press B to go to the Reboot confirmation screen. B.
  • Page 34: System Status Screen

    1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES System Status screen The System Status screen contains the following information: • Serial Number assigned to the chassis • Operation Mode for the Web FIlter specified in screen 3 (Change filtering mode) •...
  • Page 35: Step 1B: Lcd Panel Setup Procedures

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Step 1B: LCD Panel Setup Procedures LCD Panel A. Connect the AC power cord(s) to the back of the chassis and plug the cord(s) into a UPS power supply unit. B. Power on the server following the instructions at Step 1A: Quick Start Setup Procedures, Power on the WFR.
  • Page 36: M86 Menu

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES M86 menu When the M86 menu option is selected from the LCD Menu tree, the following menu items display in the panel, the entire list which is viewable by using the navi- gation keys: •...
  • Page 37: Ip / Lan1 And 2

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES IP / LAN1 and 2 When the IP / LAN 1 (2) option is selected, the IP / LAN 1 (2) screen displays with the following menu items: • Configure LAN 1 (2) IP •...
  • Page 38: Host Name

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Host Name When the Host Name option is selected, the Host Name screen displays with the Configure Hostname menu item. A. Choose Configure Hostname and press the checkmark key to go to the Configure Hostname screen.
  • Page 39: Non-Quick Start Procedures Or Settings

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES Non-Quick Start procedures or settings The options described below do not pertain to the quick start setup process. WFR Patch Level When the WFR Patch Level option is selected, “WFR” and the version number of the currently installed software build displays.
  • Page 40: Lcd Options Menu

    1B: LCD P NSTALL THE ERVER ANEL ETUP ROCEDURES LCD Options menu When “LCD Options >” is selected, the following menu items display on the screen: Heartbeat, Backlight, LCD Controls >. Make a selection from the menu, and press the checkmark / ENTER key to go to that screen. Heartbeat When the Heartbeat option is selected, the Heartbeat screen displays.
  • Page 41: Step 2: Physically Connect The Unit To The Network

    2: P NSTALL THE ERVER HYSICALLY ONNECT THE NIT TO THE ETWORK Step 2: Physically Connect the Unit to the Network Now that your WFR network parameters are set, you can physically connect the unit to your network. This step requires two standard CAT-5E cables. A.
  • Page 42: Step 3: Register The Wfr And Its Applications

    ‘x’ represents an octet—and then press Enter.) • If pinging the IP address of the WFR is unsuccessful, try restarting the network service or rebooting the WFR. • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. M86 S...
  • Page 43: Accept The Security Certificate In Firefox

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Accept the Security Certificate in Firefox A. If using a Firefox browser, in the page “This Connection is Untrusted,” click the option I Understand the Risks: B. In the next set of instructions that display, click Add Exception...: Clicking Add Exception opens the Add Security Exception window: M86 S ECURITY...
  • Page 44 3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS C. In the Add Security Exception window, click Get Certificate and wait a few seconds until the security certificate is obtained by the server. D. With the checkbox Permanently store this exception selected, click Confirm Security Exception to open the WFR Welcome window: Proceed to Accept the End User License Agreement.
  • Page 45: Temporarily Accept The Security Certificate In Ie

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Temporarily Accept the Security Certificate in IE If using an IE browser, in the page “There is a problem with this website's security certificate.”, click Continue to this website (not recommended): Selecting this option displays the WFR Welcome window with the address field and the Certificate Error button to the right of the field shaded a reddish color: Proceed to Accept the End User License Agreement.
  • Page 46: Accept The Security Certificate In Safari

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Accept the Security Certificate in Safari A. If using a Safari browser, the window explaining "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
  • Page 47: Accept The Security Certificate In Chrome

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Accept the Security Certificate in Chrome A. If using a Chrome browser, in the page “This is probably not the site you are looking for!” click the button Proceed anyway: Clicking this button launches the WFR Welcome window: NOTE: The Security Certificate must be accepted each time a new browser is launched.
  • Page 48: Accept The End User License Agreement

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Accept the End User License Agreement A. In the WFR Welcome window, click the SR icon: After clicking the SR icon—and accepting a security exception for the SR appli- cation, if necessary—the EULA Agreement dialog box opens: B.
  • Page 49: Log In To The Security Reporter Wizard

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Log in to the Security Reporter Wizard A. In the Username field of the Login window, type in the username specified in the Configure setup wizard user screen of the Quick Start Setup Procedures (Step 1A), or the Configure Setup Wizard User screen in LCD Panel Setup Procedures (Step 1B): B.
  • Page 50: Enter Main Administrator Criteria

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Enter Main Administrator Criteria A. Enter the Username the global administrator will use when logging into the Security Reporter Administrator console. The global administrator has the highest level of permissions in all user applications in WFR. B.
  • Page 51: Secure Web Gateway Setup Criteria

    3: R NSTALL THE ERVER EGISTER THE AND ITS PPLICATIONS Secure Web Gateway Setup Criteria NOTE: Secure Web Gateway Setup entries are pertinent only to SWG Policy Servers to be used with the SR in this WFR. If one or more Policy Servers will be used with the SR, these entries are not required during this Wizard setup process, but if not entered during this process, must be configured in the device registry in order to use the SR.
  • Page 52: Step 4: Generate Ssl Certificate

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Step 4: Generate SSL Certificate Generate a Self-Signed Certificate for the WFR This step requires you to generate a self-signed certificate so your browser will recognize the WFR as an accepted device. A.
  • Page 53: Ie Security Certificate Installation Procedures

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE • click the checkbox corresponding to Use Default Values to grey-out the tab, • make entries in these fields: a. Common Name (Full DNS Name) - Host name of the server, such as logo.com.
  • Page 54 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Figure A1: Windows XP, IE 8 Selecting this option displays the WFR Welcome window with the address field and the Certificate Error button to the right of the field shaded a reddish color: Figure A2: Windows XP, IE 8 B.
  • Page 55 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Figure B: Windows XP, IE 8 C. Click View certificates to open the Certificate window that includes the host name you assigned to the WFR: Figure C: Windows XP, IE 8 D.
  • Page 56 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Figure D: Windows XP, IE 8 E. Click Next > to display the Certificate Store page: Figure E: Windows XP, IE 8 F. Choose the option “Place all certificates in the following store” and then click Browse...
  • Page 57: Windows 7 With Ie 8 Or 9

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Figure H: Windows XP, IE 8 I. Click Finish to close the wizard and to open the Security Warning dialog box asking if you wish to install the certificate: Figure I: Windows XP, IE 8 J.
  • Page 58: Map The Wfr's Ip Address To The Server's Host Name

    4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE F. Refresh the current Web page by pressing the F5 key on your keyboard. G. Follow steps A to K documented in Windows XP or Vista with IE 8 or 9: •...
  • Page 59 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE B. Double-click “hosts” to open a window asking which program you wish to use to open the file. Double-click “Notepad” or “TextPad” to launch the hosts file using that selected program: C.
  • Page 60 4: G SSL C NSTALL THE ERVER ENERATE ERTIFICATE Proceed to Step 5: Test Filtering on the Web Filter. M86 S ECURITY NSTALLATION UIDE...
  • Page 61: Step 5: Test Filtering On The Web Filter

    • http://test.8e6.com • http://testsite.marshal.com B. You should receive a block page for each URL tested. If you do not, contact an M86 Security solutions engineer or technical support representative. M86 S ECURITY NSTALLATION UIDE...
  • Page 62: Step 6: Set Library Updates

    Web Filter library updates. Library updates are critical for filtering as new sites are added to the M86 Security library each day. To activate updates, visit the M86 Security Web site and enter the activation code that was issued to you by e-mail (also included on the product invoice).
  • Page 63: Log In To The Web Filter

    6: S NSTALL THE ERVER IBRARY PDATES Log in to the Web Filter A. In the WFR Welcome window, click the icon corresponding to Web Filter: After clicking the Web Filter icon—and accepting a security exception for the Web Filter application, if necessary—the Web Filter Administrator console login window opens: B.
  • Page 64: Perform A Complete Library Update

    6: S NSTALL THE ERVER IBRARY PDATES Perform a Complete Library Update Your WFR was shipped with the latest Web Filter library update for the current soft- ware release. However, as new updates continually become available, before you begin using the Web Filter you must perform a complete library update to ensure you have the latest library updates.
  • Page 65: Monitor The Library Update Process

    6: S NSTALL THE ERVER IBRARY PDATES Monitor the Library Update Process To verify that the library is being updated: A. From the navigation panel, click Updates and select Library Update Log from the menu. B. In the Library Update Log window, click View Log to display the update activity: NOTE: You will be notified in the log when the library has been completely updated by the message: “Full URL Library Update has completed.”...
  • Page 66: Step 7: Set Self-Monitoring

    7: S NSTALL THE ERVER ONITORING Step 7: Set Self-Monitoring A. In the WFR Welcome window, click the SR icon: After clicking the SR icon—and accepting a security exception for the SR appli- cation, if necessary—the Security Reporter login window opens: B.
  • Page 67 7: S NSTALL THE ERVER ONITORING NOTE: On a new server, the SR Status pop-up window opens after you log in to the user interface of the System Configuration user interface. This pop-up window will continue to open each time you access the Server Status screen, until the SR is no longer in the eval- uation mode.
  • Page 68 7: S NSTALL THE ERVER ONITORING D. Choose YES to activate monitoring. E. Enter the Master Administrator’s E-Mail Address. F. Click Choice one and enter an e-mail address of an individual in your organiza- tion that you would like notified if the SR detects any problems when processing data.
  • Page 69: Step 8: Verify Web Filter Log Transfer

    8: V NSTALL THE ERVER ERIFY ILTER RANSFER Step 8: Verify Web Filter Log Transfer To verify that the Web Filter is sending logs to the SR: A. Access the System Configuration user interface. B. Go to the Database pull-down menu and choose Tools to display the Tools screen: C.
  • Page 70: Step 9: Set Up An Swg To Use With This Wfr

    9: S NSTALL THE ERVER ET UP AN TO USE WITH THIS Step 9: Set up an SWG to use with this WFR Before you begin configuring an SWG to send logs to the SR, you will need to add the SWG in the SR’s Device Registry panel.
  • Page 71: Swg Log Transfer Setup

    SR. Additionally, in such a configuration (with multiple policy servers sending logs to one SR), a known issue exists in which SR reports may be inaccurate. M86 Security is planning to resolve this issue in the next software release. In the interim, M86 recom- mends backing up archive logs and textmaps from each policy server, and then re- importing this data after applying the software update that contains this fix.
  • Page 72: Policy Settings

    9: S NSTALL THE ERVER ET UP AN TO USE WITH THIS • Connection Method: Select “SFTP” from the pull-down menu. • Archive Location: Type in the IP address of this SR appended by a slash character ( / ) and the word ‘incoming’. For example: 200.260.10.56/ incoming for an SR with that IP address.
  • Page 73: Swg Configuration For Software Version 9.2.5

    9: S NSTALL THE ERVER ET UP AN TO USE WITH THIS SWG Configuration for Software Version 9.2.5 Configure SWG to Send Logs to the SR A. Access the SWG user interface. B. Navigate to Administration > System Settings > M86 Devices. C.
  • Page 74: Policy Settings

    9: S NSTALL THE ERVER ET UP AN TO USE WITH THIS Policy Settings A. Navigate to Policies > Default Policy Settings and verify if the settings in the Enable Emergency Policy frame and Default Policy Values frame are the ones you wish to use for sending logs to the SR.
  • Page 75: Single Sign-On Access, Default Username/Password

    NSTALL THE ERVER INGLE CCESS EFAULT SERNAME ASSWORD Single Sign-On Access, Default Username/Password Access WFR Applications from the SR User Interface By logging in to the Security Reporter using the Security Reporter Wizard user- name and password, the user interfaces of the Web Filter and SR System Config- uration administrator console are accessible to you via the SR Report Manager’s user interface.
  • Page 76: Conclusion

    NOTE: If you cannot view reports, or if your specific environment is not covered in the WFR User Guide, contact an M86 Security solutions engineer or technical support repre- sentative. Port 22 (SSH) and Port 3306 (SQL) must be open on your network to allow access by remote technical support.
  • Page 77: Best Filtering And Reporting Practices

    ILTERING AND EPORTING RACTICES ILTERING AND EPORTING RACTICES This Best Filtering and Reporting Practices section is provided to help you get started using the Web Filter and the Report Manager user interface of the Security Reporter. The Web Filter portion of this section introduces you to tools for config- uring the user interface and creating filtering profiles for users in your network.
  • Page 78 ILTERING AND EPORTING RACTICES In the Security Reports Usage Scenarios sub-section you will learn how to: • use the four basic reports for an overview of network security threats • create a customized Security Report • export a Security Report •...
  • Page 79: Web Filter Usage Scenarios

    User Guide for pages containing detailed, step-by-step instructions on configuring and/or using the tools and features described in that scenario. M86 Security’s filtering library currently consists of 104 library filtering categories, each placed in one of the 20 filtering category groups defined in the interface: Adult...
  • Page 80: Threats/Liabilities

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS I. Threats/Liabilities A. Category block Block categories that threaten your network/organization. In pertinent profiles, block access to the Security category group and other categories containing content that threaten your organization. To block categories in a profile, go to: •...
  • Page 81: Custom Lock, Block, Warn, X Strikes, Quota

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS D. Custom Lock, Block, Warn, X Strikes, Quota pages Customize a lock, block, warning, X Strikes, or quota page. Modify page contents to point to a URL within your organization, send a request to your admin- istrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
  • Page 82: Custom Category (Blocked)

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS G. Custom Category (blocked) Add a category to block content that could endanger your network/organiza- tion. Create a custom category with contents tailored to safeguard your organiza- tion. Block this category in appropriate profiles. To set up a custom category and block it, go to: •...
  • Page 83: Exception Url Bypass

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS J. Exception URL bypass Use exception URLs to grant users access to URLs blocked at the root. To grant users access to globally-blocked URLs, enable the exception URL bypass option in the Minimum Filtering Level. For these users, add the exception URLs in their profiles.
  • Page 84: Bandwidth/Productivity

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS II. Bandwidth/Productivity A. Time Quota/Hit Quota Limit time spent in PASSED categories to prevent excessive bandwidth usage and increase productivity. Enable the Quota Settings feature, and configure the Seconds Per Hit. Set up pertinent categories in the user’s profile with quotas so the user is notified and then locked out of those categories after all minutes in the quota have been used.
  • Page 85: Warn Option With Low Filter Settings

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS D. Warn option with low filter settings Warn users before they access unacceptable content that their Internet activities are logged. Set HTTPS filtering at the “low” level, and then configure the number of minutes for the interval the warning page will re-display for any user who attempts to access content deemed unacceptable.
  • Page 86: Im Patterns

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS G. IM patterns Block IM services. Enable Pattern Blocking for all users. In the profile, block Internet Communication > Chat and Instant Messaging (IM) categories. To block IM services, go to: • SYSTEM: System > Control > Filter window •...
  • Page 87: Remote Access Patterns

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS J. Remote Access patterns Block remote access patterns. Enable Pattern Blocking for all users. In the profile, block Internet Productivity > Remote Access category. To block remote access patterns, go to: • SYSTEM: System > Control > Filter window •...
  • Page 88: Rule Block

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS M. Rule block Use a rule to block the Bandwidth category. Create a rule that blocks the Band- width category and apply this rule to pertinent profiles. To create and block a rule for the Bandwidth category, go to: •...
  • Page 89: Custom Block/Warn/X Strikes/Quota

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS P. Custom Block/Warn/X Strikes/Quota pages Customize a block, warning, X Strikes, or quota pages. Modify page contents to point to a URL within your organization, send a request to your administrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
  • Page 90: General/Productivity

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS III. General/Productivity A. Warn Feature with higher thresholds Warn users before they access unacceptable content. Set HTTPS filtering at the “high” level to block certificates that may be questionable. Configure Warning settings. In the end user’s profile, apply the warn option to pertinent categories. The end user may not be able to access all requested sites due to high settings, and will receive the warning message for excessive Internet usage.
  • Page 91: Time Quota/Hit Quota

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS C. Time Quota/Hit Quota Limit time spent in PASSED categories to increase productivity. Enable the Quota Settings feature, and configure the Seconds Per Hit. Set up pertinent cate- gories in the user’s profile with quotas so the user is notified and then locked out of those categories after all minutes in the quota have been used.
  • Page 92: Customize An M86 Supplied Category

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS F. Customize an M86 Supplied Category Include region-specific content in an M86 Supplied category. Add/delete content to/from an existing M86 Supplied Category that only includes content perti- nent to your organization or region that should be blocked. Apply this category to a profile.
  • Page 93: Pass/Allow

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS IV. Pass/Allow A. Always Allow Custom Category Create a white list custom category. Set up an Always Allow category and add all URLs deemed acceptable. Apply this category to all pertinent profiles. Please keep in mind that if any library category in this list is set up to be blocked in the Minimum Filtering Level, the Minimum Filtering Level setting will override the entry in the Always Allow custom category.
  • Page 94: Override Accounts

    ILTERING AND EPORTING RACTICES ILTER SAGE CENARIOS D. Override Accounts Set up override accounts to grant specified users access to URLs blocked for general users. Enable the option to bypass the Minimum Filtering Level using an override account. Create the override account profile, including the accessible categories.
  • Page 95: Report Manager Usage Scenarios

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Report Manager Usage Scenarios This collection of reporting scenarios is designed to help you use the Report Manager to create typical snapshots of end user Internet activity. Each scenario is followed by setup information. Please consult the “How to” section in the index of the WFR User Guide for pages containing detailed, step-by-step instructions on configuring and/or using the tools and features described in that scenario.
  • Page 96: Step B: Further Investigate Using A Summary Drill Down Report

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS This report shows the top 20 categories that were most frequently visited by users yesterday. Review the list of categories in this canned report. In a later step you will need to select the category to be further investigated.
  • Page 97: Step C: Create A New Report Using Yesterday's Date Scope

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Note that the drill down report view has been generated for today’s activity by default. To continue this investigation using data from yesterday’s Summary Report, you must create a new report from this current report view by first changing the date scope.
  • Page 98: Step D: Create A Double-Break Report With Two Sets Of Criteria

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS In the WFR User Guide index, see: • How to: create a new report from the current report view Step D: Create a double-break report with two sets of criteria 1. To continue this exercise, select the record for the category you wish to further investigate.
  • Page 99: Step E: Create A Detail Drill Down Report To Obtain A List Of Urls

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Step E: Create a Detail Drill Down Report to obtain a list of URLs 1. To investigate the activity of a specific user listed in the current Summary Drill Down Report view, select that user’s record and then click the Page Count or Object Count link at the far right to show results in the Detail Drill Down Report view that now displays: Note that the Detail Drill Down Report view contains columns of information...
  • Page 100: Group By' Report And Export Report Exercise

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS II. ‘Group By’ Report and Export Report exercise In this exercise you will learn how to display only the top 10 records of a summary drill down ‘group by’ report view, export that report view in the PDF output format, and then view the results of the generated PDF file.
  • Page 101: Step B: Modify The Report View To Only Display Top 10 Site Records

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Note that URLs/IP addresses of sites users visited in the category now display in the first column of the modified report view, instead of category names. In the WFR User Guide index, see: •...
  • Page 102: Step C: Export The Report View In The Pdf Output Format

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Step C: Export the report view in the PDF output format 1. To export the current report view in the PDF format, at the bottom of the report view click Export to open the Export window: By default, “PDF”...
  • Page 103 ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS 3. Print or save the PDF file using available tools or icons in the PDF file window, or close the PDF file. In the WFR User Guide index, see: • How to: export a summary Drill Down Report •...
  • Page 104: Save And Schedule A Report Exercise

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS III. Save and schedule a report exercise In this exercise you will learn how to save a report view and then create a schedule for running a report on a regular basis using criteria specified for that report. While a Summary Drill Down Report is used in this exercise, these steps also apply to a Detail Drill Down Report.
  • Page 105: Step B. Schedule A Recurring Time For The Report To Run

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Step B. Schedule a recurring time for the report to run Now that you’ve saved the report, you must schedule a time for the report to run. 1. When clicking Save and Schedule, an alert box opens with the message confirming the report was successfully saved.
  • Page 106: Create A Custom Category Group And Generate Reports

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS Reports created for a variety of purposes can be scheduled to run on different dates and times to capture records of specified user activity as necessary. IV. Create a Custom Category Group and generate reports After you’ve run a few summary and detail reports for the top visited categories, you might want to generate reports targeting specified categories only.
  • Page 107: Create A Custom User Group And Generate Reports

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS V. Create a custom User Group and generate reports In addition to running reports for various custom category groups, you might want to create one or more custom user groups and run reports for these user groups. NOTE: In order to generate reports for a custom user group, the user group must be created a day in advance, since the list of users is updated each day automatically based on group definitions and latest usage data.
  • Page 108: Step B: Generate A Report For A Custom User Group

    ILTERING AND EPORTING RACTICES EPORT ANAGER SAGE CENARIOS 3. Type in the Group Name and check the box(es) corresponding to “Patterns”, “IP Ranges”, and/or “Single Users/Exclude” to activate the frames in the section below. For this example, select “IP Ranges”. 4.
  • Page 109: Real Time Reports Usage Scenarios

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS Real Time Reports Usage Scenarios This collection of setup and usage scenarios is designed to help you understand and use basic tools in the console for enforcing your Internet usage policy. Each scenario is followed by console setup information. Please consult the “How to” section in the index of the WFR User Guide for pages containing detailed, step-by- step instructions on configuring and/or using the tools and features described in that scenario.
  • Page 110: Step B: Navigate Panels In The Policy Section

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS • Overall Ranking - view details about current gauge activity for all end users affecting gauges • Lockouts - prevent the end user from accessing specified URLs, the Internet, or the entire network •...
  • Page 111 ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS NOTE: The Gauge Ranking panel is also accessible by right-clicking a dashboard gauge and then selecting View Gauge Ranking from the menu. 2. Find the library category with the highest score, and click that score to open the Category View User panel: Note the left side of this panel is populated with rows of records for Categories affected by the selected end user.
  • Page 112: Step B: Investigate A User's Activity In A Specified Gauge

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS Step B: Investigate a user’s activity in a specified gauge 1. To find out which URLs the top end user visited in the high-scoring library cate- gory, select the category with the highest score and then click it to display a list of URLs the user visited in the right side of this panel: 2.
  • Page 113: Step C: Investigate The User's Internet Activity In Other Gauges

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS Step C: Investigate the user’s Internet activity in other gauges 1. To find out which other gauges the same user is currently affecting, return to the Gauge Ranking table by going to the lower left corner of the Category View User panel and clicking the Back button.
  • Page 114: Create A Gauge Exercise

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS 4. To find out which URLs the user is viewing in a particular library category, choose the category from the list, and then click the URL in the URLs list. In the WFR User Guide index, see: •...
  • Page 115: Step B: Add A Url Gauge

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS In the WFR User Guide index, see: • How to: access the Add/Edit Gauges panel Step B: Add a URL Gauge 1. Click New Gauge at the bottom left of the panel to open the URL Gauge panel: 2.
  • Page 116 ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS 5. From the Available User Groups list, select the user group to highlight it. 6. Click Add to move the user group to the Assigned User Groups list box. 7. After adding user groups, click Save at the bottom right of the panel to return to the Add/Edit Gauges panel that now includes the name of the gauge you just added: In the WFR User Guide index, see:...
  • Page 117: Create An Email Alert Exercise

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS Now that you know the basics of creating a gauge, you will soon be able to create and use gauges to monitor various groups of users who frequent URLs in library categories you wish to restrict, and deal in real time with Internet usage issues that endanger your network and/or consume an excessive amount of bandwidth resources.
  • Page 118 ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS 4. Type in the Alert Name to be used for the alert that will be delivered to the group administrator. 5. Specify the User Threshold ceiling of gauge activity that will trigger the alert. The default and recommended value is 200 for a URL gauge.
  • Page 119: Step B: Select Email Alert Action

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS Step B: Select Email Alert Action 1. In the Alert Action section, choose the “Email” alert notification option. Note that this action opens and activates the Email Addresses accordion at the right side of the panel. 2.
  • Page 120: Step C: Receiving An Email Alert

    ILTERING AND EPORTING RACTICES EPORTS SAGE CENARIOS Step C: Receiving an email alert When an end user’s activity in a gauge reaches the threshold limit established for an alert, it triggers an alert notification. If the email alert option was selected, an email is sent to the email address that was specified.
  • Page 121: Security Reports Usage Scenarios

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Security Reports Usage Scenarios If using an M86 Secure Web Gateway (SWG) with the WFR, this collection of reporting scenarios is tailored towards familiarizing you with tools for generating, exporting, saving, and scheduling security reports. Each scenario is followed by user interface access information.
  • Page 122: Step B: Navigate To The Security Policy Violations Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Step B: Navigate to the Security Policy Violations report Click the Security Policy Violations tab to display the the Security Policy Viola- tions report view: This report provides information on each instance in which an end user breached a security policy.
  • Page 123: Step D: Navigate To The Rule Transactions Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Step D: Navigate to the Rule Transactions report Click the Rule Transactions tab to display the Rule Transactions report view: This report includes each instance in which an end user triggered a threshold in an SWG Security Policy.
  • Page 124: Create A Drill Down Security Report View

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS • Click this icon to re-display the top six graphs and table of records (the default view) • Click this icon to display the table of records only: In the WFR User Guide index, see: •...
  • Page 125 ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Note that this report view looks similar to a basic security report view, with the following exceptions: • breadcrumb trail beneath the navigation toolbar shows the path of the current report view •...
  • Page 126: Exercise B: Create A Detail Report View

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Exercise B: Create a detail report view From the current security report view you created, click the Hit Count column in a selected record to display the detail report view: The detail report view shows a table of records with columns for Date, User IP, User name path, Site name, and URL.
  • Page 127: Create A Customized Security Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS III. Create a customized Security Report Once you become familiar with the basic four security reports and their reporting tools, you may want to create your own customized reports. This exercise will show you two different methods for running security reports.
  • Page 128 ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS • By Specific User - If selecting this option, enter the end user name—using the ‘%’ wildcard to return multiple usernames—and then click Preview Users to display query results in the list box below. •...
  • Page 129: Exercise B: Use The Report Wizard To Run A Custom Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Exercise B: Use the Report Wizard to run a custom report 1. Navigate to Reports > Security Reports > Report Wizard to display the Secu- rity Report Wizard panel where you specify criteria to include in the report you wish to generate: 2.
  • Page 130 ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS • Predefined Ranges - If choosing this default option, make a selection from the pull-down menu: “Today” (default), “Month to Date”, “Year to Date”, “Yesterday”, “Month to Yesterday”, “Year to Yesterday”, “Last Week”, “Last Weekend”, “Current Week”, “Last Month”.
  • Page 131: Export A Security Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS IV. Export a Security Report In this exercise you will learn how to export the current basic security report view in the PDF format. Step A: Specify records to include in the report Go to the bottom right of the panel and either click Export All Records, or choose specific records from the table and then click Export Selected.
  • Page 132: Step C: Download The Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Step C: Download the report To download the report in PDF format, click Download. The PDF file can be printed, saved, or emailed. Step D: View the exported Security Report The generated basic Security Report PDF file includes the following information: The header of the generated report includes the date range, report type, and report criteria, and report description.
  • Page 133 ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS At the end of the report, the Total Items display for all records. In the WFR User Guide index, see: • How to: export a Security Report M86 S ECURITY NSTALLATION UIDE...
  • Page 134: Save A Security Report

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS V. Save a Security Report A security report can be saved only by using the “Report Settings” Save option. Step A: Select Report Settings, Save option In the current security report view, navigate to the bottom left of the panel, mouse over Report Settings, and choose Save to display the Security Report Wizard panel for that report: Step B: Specify criteria in Report Details...
  • Page 135: Step C: Select The Users Or Group In Users

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS • All URLs - Check this checkbox to save all URLs • Top - Specify the number of top URLs to be saved Step C: Select the users or group in Users In Users, select one of the accordions and indicate criteria to include in the report to be generated: •...
  • Page 136: Schedule A Security Report To Run

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS VI. Schedule a Security Report to run A security report is scheduled to run using either the Report Settings Schedule method or the Security Report Wizard. Using the former method saves several steps, since the panel will be pre-populated with data from the current report view.
  • Page 137 ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS 7. In Users, select one of the accordions and indicate criteria to include in the report to be generated: • By User Group - If selecting this option, choose the User Group for your report query results.
  • Page 138: Exercise B: Use The Wizard To Create And Schedule Reports

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS If Weekly, specify the Day of the Week from the pull-down menu (Sunday - Saturday). If Monthly, specify the Day of the Month from the pull-down menu (1 - 31). c. Select the Start Time for the report: 1 - 12 for the hour, 0 - 59 for the minutes, and AM or PM.
  • Page 139: Access The Report Schedule Panel

    ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS Access the Report Schedule panel To access the Report Schedule panel that includes all productivity and security reports scheduled to run, navigate to Reports > Report Schedule: Reports scheduled to be run display as rows of records. The following information is included for each record: Name assigned to the scheduled report, Interval when the report is scheduled to run, date and time of the Last Run, date and time of the Next Run, Custom Report Name, and Start Time for the report to run.
  • Page 140 ILTERING AND EPORTING RACTICES ECURITY EPORTS SAGE CENARIOS The following information displays in this frame: Name assigned to the scheduled event; selected Report to Run; interval When to Run the report; Day of the Week the report will run if the report is a daily report, or Day of the Month the report will run if the report is a monthly report, and Start Time to run.
  • Page 141: Important Information About Using The Sr In The Evaluation Mode

    MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION VALUATION MPORTANT NFORMATION ABOUT USING THE VALUATION Evaluation Mode Pop-Up When evaluating the SR in the evaluation mode, the SR Status pop-up box opens after logging in to the System Configuration administrator console: Click the ‘X’...
  • Page 142: Report Manager Server Information Panel

    MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION EPORT ANAGER ERVER NFORMATION ANEL Report Manager Server Information Panel In the Server Information window, the Mode section displays “EVALUATION - MAX DATA STORAGE ‘X’ WEEKS”. The Expiration Info section to the right displays the amount of data space allocated to the SR and used by the SR, as well as data expiration criteria calculated for this SR if activated in the registered mode.
  • Page 143: Led Indicators And Buttons

    LED I 500 S NDICATORS AND UTTONS RONT ONTROL ANEL ON ERIES LED I NDICATORS AND UTTONS Front Control Panel on 500 Series Unit Control panel buttons, icons, and LED indicators display on the right side of the 500 series model front panel. The buttons let you perform a function on the unit, while an LED indicator corresponding to an icon alerts you to the status of that feature on the unit.
  • Page 144: Front Control Panel On A 300 Series Unit

    LED I 300 S NDICATORS AND UTTONS RONT ONTROL ANEL ON A ERIES Front Control Panel on a 300 Series Unit In addition to executing functions listed in the LCD panel menu, the keypad on the front of the server is also used for performing basic server functions. •...
  • Page 145: Regulatory Specifications And Disclaimers

    EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EGULATORY PECIFICATIONS AND ISCLAIMERS Declaration of the Manufacturer or Importer Safety Compliance USA: UL 60950-1 1st ed. 2007 Europe: Low Voltage Directive (LVD) 2006/95/EC to CB Scheme IEC 60950-1: 2001 Canada CSA C22.2 No.
  • Page 146: Ec Declaration Of Conformity

    ECLARATION OF THE ANUFACTURER OR MPORTER EC Declaration of Conformity European Community Directives Requirement (CE) Declaration of Conformity Manufacturer’s Name: M86 Security 828 W. Taft Avenue Manufacturer’s Address: Orange, CA 92865 Application of Council Directive(s): Low Voltage • 2006/95/EC • 2004/108/EC...
  • Page 147: Index

    NDEX Access the Report Schedule panel 131 Activate the Web Filter 54 activation code 54 Add to Report Schedule 97 Always Allow Custom Category 85 Bandwidth/Productivity 76 boot up 300 series server 136 500 series server 135 Category block 72 Change Quick Start password 25 Create a customized Security Report 119 Create a gauge 106...
  • Page 148 NDEX hardware specifications 4 HTTPS settings 79 HyperTerminal Setup 18 ICES-003 137 IEC 137 IM patterns 78 IP exceptions 85 LCD Panel 15 Local category adds/deletes 84 Login screen 21 LVD 137 Minimum Filtering Level 74 Modify report 93 Overall Quota 76 Override Account bypass 74 Override Accounts 86 P2P patterns 77...
  • Page 149 NDEX Save a Security Report 126 Save report 96 Schedule a Security Report to run 128 SE Keywords 80 Search Engine Keywords 73 Security Report exportation 123 Security Reporter Wizard 28 Security Reports types 113 serial number 54 Serial Number assigned to the chassis 26 serial port cable 15 Server Information 134 shut down 31...
  • Page 150 NDEX M86 S ECURITY NSTALLATION UIDE...
  • Page 152 M86 Security Corporate Headquarters (USA): 8845 Irvine Center Drive, CA 92618 • Tel: 949.932.1000 or 888.786.7999 Fax: 949.932.1086...

This manual is also suitable for:

550

Table of Contents