C Onfiguration S Ection - 8e6 Technologies TAR User Manual

Table of Contents

Advertisement

C
S
ONFIGURATION
ECTION
C
ONFIGURATION
Introduction
48
I
NTRODUCTION
The Configuration Section of this user guide is comprised of
five chapters with information on configuring and using TAR
to immediately alert you to any end user Internet activity not
within your organization's Internet usage policies:
• Chapter 1: Threat Score Setup - This chapter explains
how the global administrator assigns a threat score
"weight" to each library category on the source (primary)
R3000 connected to this TAR server. A threat score is a
component that influences gauge movement.
• Chapter 2: Custom Gauge Setup, Usage - This chapter
explains how gauges are configured and monitored.
• Chapter 3: Alerts, Lockout Management - This chapter
explains how alerts are set up and used, and how to
manage end user lockouts.
• Chapter 4: Analyze Web Usage Trends - This chapter
explains how URL trend reports are used for assessing
end user Internet/network activity. For additional or
historical information about end user Internet usage
trends, the R3000's Real Time Probe interface—and the
ER's Web Client reporting application, if the ER server is
installed and connected to the source R3000—can be
accessed from the TAR interface.
• Chapter 5: View User Category Activity - This chapter
explains how to perform a custom search on Internet/
network activity performed by a specified user or within a
specified category.
S
ECTION
8
6 T
,
T
E
ECHNOLOGIES
HREAT
U
G
A
R
NALYSIS
EPORTER
SER
UIDE

Advertisement

Table of Contents
loading

Table of Contents