Threat Analysis Reporter Introduction - M86 Security HL Installation Manual

Threat analysis reporter
Table of Contents

Advertisement

T
A
HREAT
NALYSIS
Thank you for choosing to install the M86 Security Threat Analysis Reporter. This
product addresses user-generated Web threats such as excessive use of band-
width and inappropriate Internet usage, and provides network administrators tools
to monitor such threats so management can enforce corporate Internet usage poli-
cies.
Working in conjunction with M86 Security's Web Filter, the Threat Analysis
Reporter translates end user Internet activity from the Web Filter's logs into
dynamic graphical snapshots of network Internet traffic. Using remediation tools in
the console, administrators and management can then manage and control user-
generated Web threats in real time.
The TAR HL and SL server models include RAID technology for fault tolerance and
high performance.
Quick setup procedures—to implement the best usage practices for the Threat
Analysis Reporter—are included in the Best Usage Practices section that follows
the Conclusion of this guide.
M86 S
I
G
ECURITY
NSTALLATION
UIDE
R
EPORTER
T
A
HREAT
NALYSIS
I
NTRODUCTION
R
I
EPORTER
NTRODUCTION
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HL and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

MsaSl

Table of Contents