M86 Ir Introduction; About This Document - M86 Security MSA Installation Manual

Ir
Hide thumbs Also See for MSA:
Table of Contents

Advertisement

M86 IR I
NTRODUCTION
Thank you for choosing to install the M86 Security IR (Web Filter with Integrated
Reporter). This product combines the Web Filter with the Enterprise Reporter (ER)
to track end user Internet activity and generate reports that assist administrators in
developing policies and targeting sites to be filtered, in order to maximize band-
width utilization and productivity.
The Web Filter can be configured to block specific Web sites or service ports,
thereby protecting your organization against lost productivity, network bandwidth
issues, and possible legal problems that can result from the misuse of Internet
resources. This product also features expansive library categories, instant
message and peer-to-peer blocking, user authentication, and intuitive screens and
fields for ease of use when configuring and maintaining the server, as well as
managing user and group filtering profiles.
The ER is comprised of the server and client application. Once the ER server is
configured and Web Filter log files have populated the database, an administrator
can use the ER client reporting application to virtually generate an unlimited
number of queries and reports from data in the database. This data shows which
end user is accessing which site, the duration of each site visit, and the frequency
of these visits. The client gives the administrator the ability to interrogate massive
datasets through flexible drill-down technology, until the desired view is obtained,
and then memorize and save the view to a user-defined report menu for repetitive,
scheduled execution and distribution.
Quick setup procedures to implement the best filtering practices for the
scenarios—described in the second paragraph—are included in the Best Filtering
Practices section that follows the Conclusion of this guide.
Additionally, quick setup procedures to implement the best reporting practices
using the ER client are included in the Best Reporting Practices section that
follows the Best Filtering Practices section of this guide.

About this Document

This document is divided into the following sections:
• Introduction - This section is comprised of an overview of the IR product and
how to use this document
• Service Information - This section provides M86 Security contact information
• Preliminary Setup Procedures - This section includes instructions on how to
physically set up the IR in your network environment
• Install the Server - This section explains how to configure the IR for filtering
and reporting
• Conclusion - This section indicates that the installation steps have been
completed
• Best Filtering Practices - This section includes a chart of library categories
organized into Threat Class Groups, accompanied by filtering scenarios and
directions for implementing the best filtering practices to secure your network,
prevent excessive bandwidth usage, and increase productivity
M86 S
I
G
ECURITY
NSTALLATION
UIDE
M86 IR I
A
NTRODUCTION
BOUT THIS
D
OCUMENT
1

Advertisement

Table of Contents
loading

Table of Contents