Chapter 5: Identify Users, Threats; Perform A Custom Search - M86 Security Threat Analysis Reporter User Manual

Table of Contents

Advertisement

C
S
C
5: I
U
, T
ONFIGURATION
ECTION
HAPTER
DENTIFY
SERS
HREATS

Chapter 5: Identify Users, Threats

If there are certain end users who are generating excessive,
unwanted traffic on the network, or if some library catego-
ries containing URLs against your organization's policies
are persistently being frequented, you can target offending
entities by performing a custom search to identify which
users, URLs, and port are being accessed.

Perform a Custom Search

In the navigation toolbar, mouse over the Report/Analysis
menu link and select Custom Search to display the Custom
Search panel:
Fig. 3:5-1 Custom Search, Users accordion opened
This panel displays the Search Criteria frame to the left with
the open Users accordion and closed Available Threats/
Groups accordion, Timespan and Top Results sliders,
Search button; and to the right, the empty Results target
frame.
103
M86 S
U
G
ECURITY
SER
UIDE

Advertisement

Table of Contents
loading

This manual is also suitable for:

M86 threat analysis reporter

Table of Contents