Configuration Section; Introduction - M86 Security Threat Analysis Reporter User Manual

Table of Contents

Advertisement

C
ONFIGURATION

Introduction

The Configuration Section of this user guide is comprised of
five chapters with information on configuring and using TAR
to immediately alert you to any end user Internet activity not
within your organization's Internet usage policies:
• Chapter 1: Gauge Components - This chapter describes
• Chapter 2: Custom Gauge Setup, Usage - This chapter
• Chapter 3: Alerts, Lockout Management - This chapter
• Chapter 4: Analyze Usage Trends - This chapter
• Chapter 5: Identify Users, Threats - This chapter explains
M86 S
U
G
ECURITY
SER
UIDE
S
the types of gauges, the components of a gauge, how to
read a gauge, and how to perform shortcuts using
gauges.
explains how gauges are configured and monitored.
explains how alerts are set up and used, and how to
manage end user lockouts.
explains how trend charts are used for assessing end
user Internet/network activity. For additional or historical
information about end user Internet usage trends, the
Web Filter's user interface and the ER's Web Client
reporting application and Administrator console can be
accessed from the TAR user interface—if an ER server is
installed and connected to the source Web Filter.
how to perform a custom search on Internet/network
usage by a specified user, or for a specified threat or
threat group.
C
ONFIGURATION
ECTION
S
I
ECTION
NTRODUCTION
45

Advertisement

Table of Contents
loading

This manual is also suitable for:

M86 threat analysis reporter

Table of Contents