Step B: Navigate To The Security Policy Violations Report; Step C: Navigate To The Traffic Analysis Report - M86 Security 350 Installation Manual

Web filter and reporter
Hide thumbs Also See for 350:
Table of Contents

Advertisement

B
F
R
EST
ILTERING AND
EPORTING

Step B: Navigate to the Security Policy Violations report

Step C: Navigate to the Traffic Analysis report

114
P
S
RACTICES
ECURITY
Click the Security Policy Violations tab to display the the Security Policy Viola-
tions report view:
This report provides information on each instance in which an end user breached
a security policy.
Click the Traffic Analysis tab to display the Traffic Analysis report view:
This report shows activity for end user access of objects utilizing an excessive
amount of network bandwidth.
R
U
S
EPORTS
SAGE
CENARIOS
M86 S
I
G
ECURITY
NSTALLATION
UIDE

Advertisement

Table of Contents
loading

This manual is also suitable for:

550

Table of Contents