T
A
R
HREAT
NALYSIS
EPORTER
About this Document
Conventions Used in this Document
2
I
A
NTRODUCTION
BOUT THIS
This document is divided into the following sections:
• Introduction - This section is comprised of an overview of the Threat Analysis
Reporter product and how to use this document
• Service Information - This section provides M86 Security contact information
• Preliminary Setup Procedures - This section includes instructions on how to
physically set up the Threat Analysis Reporter in your network environment
• Install the Server - This section explains how to configure the Threat Analysis
Reporter
• Conclusion - This section indicates that the installation steps have been
completed
• Best Usage Practices - This section includes scenarios and instructions for
implementing the best practices when using the Threat Analysis Reporter
• LED Indicators and Buttons - This section explains how to read LED indica-
tors and use LED buttons for troubleshooting the unit
• Regulatory Specifications and Disclaimers - This section cites safety and
emissions compliance information for the TAR models referenced in this docu-
ment
• Appendix: Optional Ethernet Tap Installation - This appendix explains how
to install the optional Ethernet Tap device on your network for bandwidth moni-
toring
• Index - An alphabetized list of some topics included in this document
The following icons are used throughout this document to call attention to impor-
tant information pertaining to handling, operation, and maintenance of the server;
safety and preservation of the equipment, and personal safety:
NOTE: The "note" icon is followed by additional information to be considered.
WARNING: The "warning" icon is followed by information alerting you to a potential situa-
tion that may cause damage to property or equipment.
CAUTION: The "caution" icon is followed by information warning you that a situation has
the potential to cause bodily harm or death.
IMPORTANT: The "important" icon is followed by information M86 Security recommends
that you review before proceeding with the next action.
The "book" icon references the Threat Analysis Reporter User Guide. This icon is found in
the Best Practices section of this document.
D
OCUMENT
M86 S
I
G
ECURITY
NSTALLATION
UIDE
Need help?
Do you have a question about the HL and is the answer not in the manual?