Hreat Nalysis Eporter Valuation Uide; Overview; Note To Evaluators; Install, Configure, And Test Tar - 8e6 Technologies Threat Analysis Reporter TAR HL/SL/MSA Evaluation Manual

Threat analysis reporter
Table of Contents

Advertisement

T
A
HREAT
NALYSIS

Overview

The Threat Analysis Reporter helps administrators manage internal Web-based
threats by monitoring Internet usage information by user in real-time, and by
providing proactive remediation tools to enforce the organization's Acceptable Use
Policy.

Note to Evaluators

Thank you for taking the time to review 8e6's Threat Analysis Reporter (TAR) appli-
ance. Your interest in our company and product is greatly appreciated.
This Evaluation Guide Is designed to provide product evaluators an efficient way to
install, configure and exercise the main product features of the TAR.

Install, Configure, and Test TAR

To install the TAR appliance, configure the server, and to test the unit to ensure that
reporting is operational, please refer to the step-by-step instructions in the Threat
Analysis Reporter Quick Start Guide provided inside the carton containing the
chassis.
Please note that prior to reviewing TAR, the R3000 Internet Filter must already be
installed; this appliance is required for sending logs to the Reporter. See the R3000
Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter.
8
6 T
, T
A
E
ECHNOLOGIES
HREAT
NALYSIS
R
EPORTER
R
E
G
EPORTER
VALUATION
UIDE
T
A
R
HREAT
NALYSIS
EPORTER
E
VALUATION
E
G
O
VALUATION
UIDE
VERVIEW
G
UIDE
1

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tar hlTar slTar msa

Table of Contents