Page 1
M86 IR INSTALLATION GUIDE Model: MSA Software Versions: Web Filter 5.0.00, ER 6.0.10 Document Version: 02.01.12...
Page 2
Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connec- tion with the furnishing, performance, or use of this manual or the examples herein.
ONTENTS M86 IR I ...................1 NTRODUCTION About this Document...................... 1 Conventions Used in this Document................2 ..................3 ERVICE NFORMATION M86 Technical Support Call Procedures..............3 ..............4 RELIMINARY ETUP ROCEDURES Unpack the Unit from the Carton................... 4 Select a Site for the Server..................... 5 Rack Mount the Server.
Page 4
ONTENTS Time Zone regional setting ....................27 Non-Quick Start procedures or settings ................28 Reboot system ......................28 Change Quick Start password ................... 28 Reset admin console account ..................28 System Status screen ......................29 Log Off, Disconnect the Peripherals ..................29 Physically Connect the IR to the Network ................
Page 5
ONTENTS II. Bandwidth/Productivity ...................... 63 A. Time Quota/Hit Quota ....................63 B. Overall Quota ......................63 C. Time Based Profiles ....................63 D. Warn option with low filter settings ................64 E. Warn-strike ......................... 64 F. P2P patterns ....................... 64 G. IM patterns ......................... 65 H.
Page 6
ONTENTS Summary Report ......................86 Detail Report ......................86 ..87 MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION Evaluation Mode Pop-Ups.................... 87 Administrator Console, Expiration Screen..............87 ER Web Client, ER Server Information Window............88 LED I ..............89 NDICATORS AND UTTONS Diagrams and Descriptions ....................
M86 IR I NTRODUCTION Thank you for choosing to install the M86 Security IR (Web Filter with Integrated Reporter). This product combines the Web Filter with the Enterprise Reporter (ER) to track end user Internet activity and generate reports that assist administrators in developing policies and targeting sites to be filtered, in order to maximize band- width utilization and productivity.
CAUTION: The “caution” icon is followed by information warning you that a situation has the potential to cause bodily harm or death. IMPORTANT: The “important” icon is followed by information M86 Security recommends that you review before proceeding with the next action.
Any initial hardware setup problem that cannot be resolved at your internal organi- zation should be referred to an M86 Security solutions engineer or technical support representative. For technical assistance or warranty repair, please visit http://www.m86security.com/support/ .
Carefully unpack the unit from the carton and verify that all accessories are included. Save all packing materials in the event that the unit needs to be returned to M86 Security. The carton should contain the following items: • 1 IR unit •...
RELIMINARY ETUP ROCEDURES ELECT A ITE FOR THE ERVER Select a Site for the Server The server operates reliably within normal office environmental limits. Select a site that meets the following criteria: • Clean and relatively free of excess dust. •...
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount the Server Rack Setup Precautions WARNING: Before rack mounting the server, the physical environment should be set up to safely accommodate the server. Be sure that: • The weight of all units in the rack is evenly distributed. Mounting of the equip- ment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Rack Mount Instructions Optional: Install the Chassis Rails NOTE: If your chassis does not come with chassis rails, please follow the procedure listed on the last page of this sub-section to install the unit directly into the rack. CAUTION: Please make sure that the chassis covers and chassis rails are installed on the chassis before you install the chassis into the rack.
Page 14
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Locate the three holes on each side of the chassis and locate the three corre- sponding holes on each of the inner rail. 4. Attach an inner rail to each side of the chassis and secure the inner rail to the chassis by inserting three Type G screws through the holes on each side of the chassis and the inner rail.
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Traditional UP Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
Page 16
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 8. You will need to release the safety taps on both sides of the chassis in order to completely remove the chassis out of the rack. M86 S ECURITY NSTALLATION UIDE...
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Optional: Install the Open Racks After you have installed the inner rails on the chassis, you are ready to install the outer rails of rail assemblies to the rack. NOTE: The rails are designed to fit in the racks with the depth of 28” to 33”. •...
Page 18
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 3. Attach the front (short) bracket to the front end of the rack, and secure it to the rack with two Type H screws and Type I washers as shown below. (See the previous page for descriptions of Type H and Type I hardware components.) 4.
Page 19
RELIMINARY ETUP ROCEDURES OUNT THE ERVER 6. Slide the inner rails which are attached to the chassis into the outer rails on the rack. M86 S ECURITY NSTALLATION UIDE...
RELIMINARY ETUP ROCEDURES OUNT THE ERVER Install the Chassis into the Rack CAUTION: Before installing the chassis into the rack: • Make sure that the rack is securely anchored onto an unmovable surface or structure before installing the chassis into the rack. •...
• In geographic regions that are susceptible to electrical storms, M86 Security highly recommends plugging the AC power cord for the server into a surge suppressor.
WARNING: If the server is used in a manner not specified by the manufacturer, the protection provided by the server may be impaired. WARNING: M86 Security is not responsible for regulatory compliance of any server that has been modified. Altering the server’s enclosure in any way other than the installation operations specified in this document may invalidate the server’s safety certifications.
RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION AC Power Cord and Cable Precautions WARNING: • The AC power cord for the server must be plugged into a grounded, power outlet. • Do not modify or use a supplied AC power cord if it is not the exact type required in the region where the server will be installed and used.
RELIMINARY ETUP ROCEDURES ENERAL AFETY NFORMATION Motherboard Battery Precautions CAUTION: The battery on the motherboard should not be replaced without following instruc- tions provided by the manufacturer. Only qualified service personnel should replace batteries. The battery contains energy and, as with all batteries, a malfunction can cause heat, smoke, or fire, release toxic materials, or cause burns.
1: S NSTALL THE ERVER ETUP ROCEDURES NSTALL THE ERVER Step 1: Setup Procedures This step requires you to link the workstation to the IR. You have the option of using the text-based Quick Start setup procedures described in Step 1A, or the Adminis- trator console setup procedures described in the Appendix.
(see Fig. 2). Fig. 1 - Portion of MSA chassis rear Fig. 2 - Diagram of MSA chassis front panel, power button at far right Once the IR is powered up, proceed to the instructions for HyperTerminal Setup Procedures.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES HyperTerminal Setup Procedures If using a serial console, follow these procedures on a Windows XP machine to create a HyperTerminal session. NOTE: HyperTerminal is no longer included with Windows as of Microsoft’s Vista system. Please note on Microsoft’s Web page “What happened to HyperTerminal?”...
Page 28
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES B. In the Connection Description dialog box, enter any session Name, and then click OK to open the Connect To dialog box: C. At the Connect using field, select the COM port assigned to the serial port on the laptop (probably “COM1”), and then click OK to open the Properties dialog box, displaying the Port Settings tab: D.
Page 29
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES F. In the HyperTerminal session window, go to File > Properties to open the Prop- erties dialog box, displaying the Connect To and Settings tabs: G. Click the Settings tab, and at the Emulation menu select “VT100”. H.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Login screen The login screen displays after powering on the IR unit using a monitor and keyboard, or creating a HyperTerminal session. NOTES: If using a HyperTerminal session, the login screen will display with black text on a white background.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Quick Start menu: administration menu A. At the Press the number of your selection prompt, press 2 to select the “Quick Start Setup” process. The Quick Start menu takes you to the following configuration screens to make entries for configuring the IR: •...
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Change filtering mode A. From the Quick Start menu, press 3 to go to the Filter mode configuration screen. B. Select a filter mode (Invisible, Router, or Firewall) using up-arrow and down- arrow keys.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Configure host name A. From the Quick Start menu, press 8 to go to the Configure host name screen. B. At the Enter host name prompt, type in the host name and press Enter. C.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Non-Quick Start procedures or settings The options described below do not pertain to the quick start setup process. Reboot system A. From the Quick Start menu, press B to go to the Reboot confirmation screen. B.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES System Status screen The System Status screen contains the following information: • Serial Number assigned to the chassis • Operation Mode specified in screen 3 (Change filter mode) • Capturing Interface specified in screen 4 or 5 (Configure network interface LAN1 or LAN2) •...
Internet traffic you wish to filter. E. Repeat sub-steps B and C for the IR’s LAN 2 port. Portion of MSA chassis rear F. Wait until the reboot process has completed, indicated by the drive light staying off for 30 seconds.
• Is the administrator workstation able to ping the IR’s LAN 1 IP address? • If pinging the IP address of the IR is unsuccessful, try restarting the network service or rebooting the IR. • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. M86 S...
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Accept the Security Certificate in Firefox A. If using a Firefox browser, in the page “This Connection is Untrusted,” click the option I Understand the Risks: B. In the next set of instructions that display, click Add Exception...: Clicking Add Exception opens the Add Security Exception window: M86 S ECURITY...
Page 39
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES C. In the Add Security Exception window, click Get Certificate and wait a few seconds until the security certificate is obtained by the server. D. With the checkbox Permanently store this exception selected (or grayed- out), click Confirm Security Exception to open the Welcome window of the IR user interface: NOTE: You will need to add a security exception for the Web Filter, Enterprise Reporter...
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Temporarily Accept the Security Certificate in IE A. If using an IE browser, in the page “There is a problem with this website's secu- rity certificate.”, click Continue to this website (not recommended): Selecting this option displays the IR splash page with the address field and the Certificate Error button to the right of the field shaded a reddish color: B.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Accept the Security Certificate in Safari A. If using a Safari browser, the window explaining "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
1A: Q NSTALL THE ERVER UICK TART ETUP ROCEDURES Accept the Security Certificate in Chrome A. If using a Chrome browser, in the page “This is probably not the site you are looking for!” click the button Proceed anyway: Clicking this button launches the IR splash page: NOTE: The Security Certificate must be accepted each time a new browser is launched.
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Step 2: Log in Web Filter, Generate SSL Certificate This step requires you to log in to the Web Filter and generate a self-signed certif- icate for the IR to ensure secure exchanges between the appliance and your browser.
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Generate SSL Certificate A. Navigate to System > UI SSL Certificate to open the SSL Certificate window: B. Click Generate Certificate to open the box that asks if you wish to continue, which would restart your server.
Page 45
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE D. After the certificate is generated, you will be prompted to click OK and close your browser. Wait a few minutes before attempting to access the user inter- face.
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE IE Security Certificate Installation Procedures Access the IR splash page A. Launch an Internet Explorer 8 browser window. B. Type in https://x.x.x.x:1443 in the address field (in which ‘x.x.x.x’ represents the LAN 1 IP address assigned to the IR).
Page 47
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Figure A2: Windows XP, IE 8 B. Click Certificate Error to open the Certificate Invalid box: Figure B: Windows XP, IE 8 C. Click View certificates to open the Certificate window that includes the host name you assigned to the IR: M86 S ECURITY...
Page 48
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Figure C: Windows XP, IE 8 D. Click Install Certificate... to launch the Certificate Import Wizard: Figure D: Windows XP, IE 8 E. Click Next > to display the Certificate Store page: Figure E: Windows XP, IE 8 M86 S ECURITY...
Page 49
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE F. Choose the option “Place all certificates in the following store” and then click Browse... to open the Select Certificate Store box: Figure F: Windows XP, IE 8 G.
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map the IR’s IP address to its host name. Proceed to Map the IR’s IP Address to the Server’s Host Name.
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE Now that the security certificate is installed, you will need to map the IR’s IP address to its host name. Proceed to Map the IR’s IP Address to the Server’s Host Name.
Page 52
2: L SSL C NSTALL THE ERVER OG IN ILTER ENERATE ERTIFICATE C. Enter a line in the hosts file with the IR’s IP address and its host name—the latter entered during the Configure host name screen of the Quick Start Setup Procedures (Step 1A), or the Network: LAN Settings steps from the Console Setup Procedures (in the Appendix)—and then save and close the file.
• http://test.8e6.net • http://test.marshal8e6.com.tw • http://testsite.marshal.com B. You should receive a block page for each URL tested. If you do not, contact an M86 Security solutions engineer or technical support representative. M86 S ECURITY NSTALLATION UIDE...
Web Filter library updates. Library updates are crit- ical for filtering as new sites are added to the M86 Security library each day. To activate updates, visit the M86 Security Web site and enter the activation code that was issued to you by e-mail (also included on the product invoice).
Page 55
4: S NSTALL THE ERVER IBRARY PDATES C. In the Manual Update to M86 Supplied Categories window, click the radio button corresponding to Full URL Library Update. D. Click Update Now to begin the update process. M86 S ECURITY NSTALLATION UIDE...
Obtain the latest M86 IR Web Filter User Guide at http://www.m86security.com/ support/R3000/documentation.asp For troubleshooting tips, visit http://www.m86security.com/software/8e6/ts/ r3000.html IMPORTANT: M86 Security recommends reviewing the Best Filtering Practices section to implement setup procedures for the filtering scenarios described within that section. M86 S ECURITY...
5: C ER A NSTALL THE ERVER HANGE THE DMIN AME AND ASSWORD ONITORING Step 5: Change the ER Admin User Name and Password, Set Self-Monitoring After configuring the Web Filter, click the Quit button at the top of the screen to exit the Web Filter Administrator console.
5: C ER A NSTALL THE ERVER HANGE THE DMIN AME AND ASSWORD ONITORING NOTE: If using the ER in the Evaluation Mode, the ER Status pop-up window opens when accessing the Server Status screen. See the M86 IR Enterprise Reporter Administrator User Guide for information about the Evaluation Mode.
5: C ER A NSTALL THE ERVER HANGE THE DMIN AME AND ASSWORD ONITORING D. In the Confirm Password field, re-enter the password. E. Click Save. Set Self-Monitoring A. From the Server pull-down menu, choose Self-Monitoring to display the Self Monitoring screen: B.
6: L ER C NSTALL THE ERVER AUNCH THE LIENT Step 6: Launch the ER Client A. From the IR splash page, click the button corresponding to Enterprise Reporter: This action opens the ER Web Client login window: NOTE: You will need to follow the procedures for accepting the security certificate for the ER Web Client.
Page 61
6: L ER C NSTALL THE ERVER AUNCH THE LIENT D. Click Add User to open the Enter User Permissions dialog box: E. Enter the Username. F. Enter the Password, and Confirm Password. G. Select the User Type (“Admin” or “Sub-Admin”). H.
NOTE: If you cannot view reports, or if your specific environment is not covered in the ER Administrator User Guide, contact an M86 Security solutions engineer or technical support representative. Port 22 (SSH) and Port 3306 (SQL) must be open on your network to allow access by remote technical support.
ILTERING RACTICES ILTERING RACTICES This collection of setup and usage scenarios is designed to help you understand and use basic tools in the Web Filter console for configuring the user interface and creating filtering profiles for users in your network. Each scenario is followed by console setup information.
LASS ROUPS Threat Class Groups M86 Security’s filtering library currently consists of 104 library filtering categories, each placed in one of the 20 filtering category groups defined in the interface: Adult Content, Bandwidth, Business/Investments, Community/Organizations, Educa- tion, Entertainment, Government/Law/Politics, Health/Fitness, Illegal/Question- able, Information Technology, Internet Communication, Internet Productivity, Internet/Intranet Misc., News/Reports, Religion/Beliefs, Security, Shopping,...
ILTERING RACTICES HREAT LASS ROUPS I. Threats/Liabilities A. Category block Block categories that threaten your network/organization. In pertinent profiles, block access to the Security category group and other categories containing content that threaten your organization. To block categories in a profile, go to: •...
ILTERING RACTICES HREAT LASS ROUPS D. Custom Lock, Block, Warn, X Strikes, Quota pages Customize a lock, block, warning, X Strikes, or quota page. Modify page contents to point to a URL within your organization, send a request to your admin- istrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
ILTERING RACTICES HREAT LASS ROUPS G. Custom Category (blocked) Add a category to block content that could endanger your network/organiza- tion. Create a custom category with contents tailored to safeguard your organiza- tion. Block this category in appropriate profiles. To set up a custom category and block it, go to: •...
ILTERING RACTICES HREAT LASS ROUPS J. Exception URL bypass Use exception URLs to grant users access to URLs blocked at the root. To grant users access to globally-blocked URLs, enable the exception URL bypass option in the Minimum Filtering Level. For these users, add the exception URLs in their profiles.
ILTERING RACTICES HREAT LASS ROUPS II. Bandwidth/Productivity A. Time Quota/Hit Quota Limit time spent in PASSED categories to prevent excessive bandwidth usage and increase productivity. Enable the Quota Settings feature, and configure the Seconds Per Hit. Set up pertinent categories in the user’s profile with quotas so the user is notified and then locked out of those categories after all minutes in the quota have been used.
ILTERING RACTICES HREAT LASS ROUPS D. Warn option with low filter settings Warn users before they access unacceptable content that their Internet activities are logged. Set HTTPS filtering at the “low” level, and then configure the number of minutes for the interval the warning page will re-display for any user who attempts to access content deemed unacceptable.
ILTERING RACTICES HREAT LASS ROUPS G. IM patterns Block IM services. Enable Pattern Blocking for all users. In the profile, block Internet Communication > Chat and Instant Messaging (IM) categories. To block IM services, go to: • SYSTEM: System > Control > Filter window •...
ILTERING RACTICES HREAT LASS ROUPS J. Remote Access patterns Block remote access patterns. Enable Pattern Blocking for all users. In the profile, block Internet Productivity > Remote Access category. To block remote access patterns, go to: • SYSTEM: System > Control > Filter window •...
ILTERING RACTICES HREAT LASS ROUPS M. Rule block Use a rule to block the Bandwidth category. Create a rule that blocks the Band- width category and apply this rule to pertinent profiles. To create and block a rule for the Bandwidth category, go to: •...
ILTERING RACTICES HREAT LASS ROUPS P. Custom Block/Warn/X Strikes/Quota pages Customize a block, warning, X Strikes, or quota pages. Modify page contents to point to a URL within your organization, send a request to your administrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
ILTERING RACTICES HREAT LASS ROUPS B. Warn-strike with higher thresholds Warn users before they access unacceptable content and may be locked out of the Internet. Set HTTPS filtering at the “high” level, configure Warning settings, and enable X Strikes Blocking. In the end user’s profile, set the Warn categories, and enable X Strikes Blocking.
ILTERING RACTICES HREAT LASS ROUPS E. Overall Quota Restrict all quota time in a profile to improve productivity. Cap the amount of time a user spends in all quota-marked categories by enabling the Overall Quota option and specifying the number of minutes the end user can visit quota-marked categories before being notified and then locked out of these categories.
ILTERING RACTICES HREAT LASS ROUPS H. Custom Block/Warn/X Strikes/Quota pages Customize a block, warning, X Strikes, or quota pages. Modify page contents to point to a URL within your organization, send a request to your administrator’s email address, or include verbiage of your choice that informs users of their Internet usage activities that triggered the page.
ILTERING RACTICES HREAT LASS ROUPS C. IP exceptions Use Exception URLs to grant individuals access to IPs blocked by the Minimum Filtering Level. Enable the option to bypass the Minimum Filtering Level using exception URLs. Enter the exception Internet/intranet IP addresses in the applicable profile.
EPORTING RACTICES HREAT LASS ROUPS EPORTING RACTICES Now that the ER is installed on the network and you have successfully logged into the client, you are ready to generate reports. This section provides an overview on using tools to produce reports that identify potential violators of your acceptable Internet usage policy, so you can take effective action.
EPORTING RACTICES EPORTING CENARIOS Reporting Scenarios This collection of reporting scenarios is designed to help you use the client to create typical snapshots of end user Internet activity. Each scenario is followed by client setup information. Please consult the “How to” section in the index of the ER Web Client User Guide for pages containing detailed, step-by-step instructions on configuring and/or using the tools and features described in that scenario.
EPORTING RACTICES EPORTING CENARIOS Step B: Further investigate using a Summary Drill Down Report Now you will use a Drill Down Report to find out which user(s) are visiting sites in the category you’ve targeted for investigation. From the top panel, go to Drill Down Reports > Categories to display the gener- ated Summary Drill Down Report view, ranking categories in order by the most visited: Note that this drill down report view has been generated for today’s activity by...
EPORTING RACTICES EPORTING CENARIOS 3. Click Apply to accept your selection and to close the window. The regenerated report now displays yesterday’s data in the Summary Drill Down Report view. In the ER Web Client User Guide index, see: • How to: create a New Report from the current report view Step D: Create a double-break report with two sets of criteria 1.
EPORTING RACTICES EPORTING CENARIOS Step E: Create a Detail Drill Down Report to obtain a list of URLs 1. To investigate the activity of a specific user listed in the current Summary Drill Down Report view, select that user’s record and then click the down arrow in the Page Count column at the far right to show results in the Detail Drill Down Report view that now displays: Note that the Detail Drill Down Report view contains columns of information...
EPORTING RACTICES EPORTING CENARIOS II. Double-break Report and Export Report exercise In this exercise you will learn how to display only the top 10 records of a summary drill down double-break report view, export that report view in the .PDF output format, and then view the results of the generated .PDF file.
EPORTING RACTICES EPORTING CENARIOS In the ER Web Client User Guide index, see: • How to: generate a Drill Down Report • How to: use filter columns and buttons Step B: Modify the report view to only display top 10 site records 1.
EPORTING RACTICES EPORTING CENARIOS Step C: Export the report view in the .PDF output format 1. To export the current report view in the .PDF format, at the top of the report view click Export Report to open the Export Drill Down Report window: By default, “PDF”...
Page 87
EPORTING RACTICES EPORTING CENARIOS In the ER Web Client User Guide index, see: • How to: export a summary Drill Down Report • How to: view and print a Web Client report See also: • How to: export a detail Custom Report •...
EPORTING RACTICES EPORTING CENARIOS III. Save and schedule a report exercise In this exercise you will learn how to save a report view and then create a schedule for running a report on a regular basis using criteria specified for that report. While a Summary Drill Down Report is used in this exercise, these steps also apply to a Detail Drill Down Report.
EPORTING RACTICES EPORTING CENARIOS NOTE: Saved reports can be edited at any time. These reports are accessed by going to Custom Reports, selecting Saved Custom Reports, and then choosing the report from the Report Name drop-down menu. In the ER Web Client User Guide index, see: •...
EPORTING RACTICES EPORTING CENARIOS In the ER Web Client User Guide index, see: • How to: schedule a report to run You have now learned how to save a report and schedule a recurring event for running this report. Reports created for a variety of purposes can be scheduled to run on different dates and times to capture records of specified user activity as necessary.
EPORTING RACTICES EPORTING CENARIOS Step B: Run a report for a specified category group 1. To create a report for category group, choose Custom Reports from the top panel. 2. Select Custom Report Wizard. 3. Specify the type of report to be generated: •...
EPORTING RACTICES EPORTING CENARIOS Step B: Generate a report for a custom user group Once the custom user group is recognized by the ER (on the following day), reports can be generated. Summary Report There are two ways to generate a summary report for a custom user group. You can use the Custom Report Wizard option (from Custom Reports), or you can use the Single User Group Drill Down Report option (from Drill Down Reports).
MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION VALUATION MPORTANT NFORMATION ABOUT USING THE VALUATION When evaluating the ER and using this product in the evaluation mode, the Expi- ration screen in the Administrator console and the ER Server Statistics window in the client will display and function differently than they do in the activated (stan- dard) mode of the ER (described in the M86 Enterprise Reporter Administrator User Guide and ER Web Client User Guide).
ER W , ER S MPORTANT NFORMATION ABOUT USING THE IN THE VALUATION LIENT ERVER NFORMATION INDOW ER Web Client, ER Server Information Window In the ER Server Information window, the note “*Evaluation Mode Enabled” displays above the ER Activity frame. To the right of this note, the Server Info button displays.
LED I NDICATORS AND UTTONS LED I NDICATORS AND UTTONS Diagrams and Descriptions LED indicators and buttons for hardware status monitoring display on the front panel, located on the right side of the chassis (see diagram below). LED Indicator Key Button Key A = Power F = Reset...
Operation of this equipment in a residential area is likely to cause harmful interfer- ence in which case the user will be required to correct the interference at his own expense. FCC Declaration of Conformity Model: MSA-002-003 M86 S ECURITY NSTALLATION...
EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER Electromagnetic Compatibility Class A Notice Industry Canada Equipment Standard for Digital Equipment (ICES-003) Bureau of Standards Metrology and Inspection (BSMI) - Taiwan M86 S ECURITY NSTALLATION UIDE...
EGULATORY PECIFICATIONS AND ISCLAIMERS ECLARATION OF THE ANUFACTURER OR MPORTER EC Declaration of Conformity European Community Directives Requirement (CE) M86 S ECURITY NSTALLATION UIDE...
PPENDIX ONSOLE ETUP ROCEDURES RELIMINARY ETUP PPENDIX ONSOLE ETUP ROCEDURES The steps in this appendix provide an alternative way to install the IR on your network, by using a crossover cable and configuring the application via the user interface. Preliminary Setup Create a “setup workstation”...
D. Power on the server by lowering the bezel and pressing the large button at the right of the front panel: Diagram of MSA chassis front panel, power button at far right The Boot Up Process The boot-up process may take 5 - 10 minutes. When the drive light remains off for 30 seconds, the system is booted up.
PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES Security Certificate Acceptance Procedures A. From the setup workstation, launch an Internet supported browser such as Firefox 3.6, Internet Explorer 7 or 8, or Safari 4.0. B. Type in https://1.2.3.4:1443 in the address field. C.
Page 102
PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES C. In the Add Security Exception window, click Get Certificate and wait a few seconds until the security certificate is obtained by the server. D. With the checkbox Permanently store this exception selected, click Confirm Security Exception to open the Welcome window of the IR user interface: NOTE: You will need to add a security exception for the Web Filter, Enterprise Reporter (Web Client), and Enterprise Reporter Administration Module when you attempt to access...
PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES Temporarily Accept the Security Certificate in IE If using an IE browser, in the page “There is a problem with this website's security certificate.”, click Continue to this website (not recommended): Selecting this option displays the IR splash page with the address field and the Certificate Error button to the right of the field shaded a reddish color: M86 S ECURITY...
PPENDIX ONSOLE ETUP ROCEDURES ECURITY ERTIFICATE CCEPTANCE ROCEDURES Accept the Security Certificate in Safari A. If using a Safari browser, the window explaining "Safari can't verify the identity of the website..." opens: Click Show Certificate to open the certificate information box at the bottom of this window: B.
PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP Network Setup For this step, you will need your network administrator to provide you the host name, gateway address, and two unused IP addresses. You will first configure the Web Filter server. Later you will configure the ER server. Access the Web Filter Administrator Console A.
PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP Network Click the System link at the top of the screen to go to the System section of the console: In this section of the console you will: • Specify the operation mode the Web Filter will use for filtering the network, listening to traffic, and sending traffic •...
PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP Network: Operation Mode From the navigation panel at the left of the screen, click Mode and choose Opera- tion Mode from the menu: Make the following entries in the Operation Mode window: A. In the Mode frame, select the operational mode the Web Filter will use for filtering: Invisible, Router, Firewall, Mobile, or ICAP.
FILTER.myserver.com (the NetBIOS name must be capitalized). It is important to enter something identifiable, because once the product is registered, this host name is used by M86 Security to recognize your account for library updates. This name needs to be a valid DNS entry.
PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP F. Enter the Gateway IP address for the default router or firewall that is the main gateway for the entire network. The Web Filter will use this IP address to communicate outside the network. WARNING: Be sure to take note of the LAN 1 and LAN 2 IP addresses and host name you assigned to the Web Filter.
PPENDIX ONSOLE ETUP ROCEDURES ETWORK ETUP the tertiary server will be used. Network: Regional Setting From the navigation panel, click Network and choose Regional Setting from the menu: Make the following selections in the Regional Setting window: A. At the Region pull-down menu, select your country from the available choices. B.
Internet traffic you wish to filter. E. Repeat sub-steps B and C for the IR’s LAN 2 port. Portion of MSA chassis rear F. Wait until the reboot process has completed, indicated by the drive light staying off for 30 seconds.
• Did you restart the IR after changing the network settings? • Do you have both LAN ports connected to your network hub? • If still unsuccessful, contact an M86 Security solutions engineer or technical support representative. D. Once you are able to access the IR splash page, proceed to Step 2: Log in Web Filter, Generate SSL Certificate from the Install the Server portion of this Instal- lation Guide.
Page 115
NDEX Save Report 82 SE Keywords 67 Search Engine Keywords 60 serial port cable 19 shut down 30 Streaming Media patterns 65 Summary Drill Down Report 75 Threats/Liabilities 59 Time Based Profiles 63 Time Quota/Hit Quota 63 UL 90 URL exceptions 71 URL Keywords 60 Warn Feature with higher thresholds 68 Warn option with low filter settings 64...