M86 Security M86 IR Enterprise Reporter User Manual

Administrator console
Table of Contents

Advertisement

Quick Links

M86 IR Enterprise Reporter

USER GUIDE

Administrator Console
Software Version: 6.0.10
Document Version: 06.15.10

Advertisement

Table of Contents
loading

Summary of Contents for M86 Security M86 IR Enterprise Reporter

  • Page 1: User Guide

    M86 IR Enterprise Reporter USER GUIDE Administrator Console Software Version: 6.0.10 Document Version: 06.15.10...
  • Page 2 M86 Security shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein.
  • Page 3: Table Of Contents

    ONTENTS ........1 NTERPRISE EPORTER VERVIEW Operations ................... 1 How to Use this User Guide ............2 Organization ..................2 Conventions ..................3 Terminology ..................4 ..........7 DMINISTRATOR ECTION Introduction ................. 7 Components and Environment ..........8 Components ..................8 Hardware ..................
  • Page 4 ONTENTS Change the Box Mode ..........19 Add/Edit/Delete Administrators screen ....... 20 View a List of Administrators ........21 Add an Administrator ............ 21 Edit an Administrator’s Login ID ........21 Delete an Administrator ..........22 Locked-out Accounts and IPs screen ......... 23 View Locked Accounts, IP addresses......
  • Page 5 ONTENTS Configure the Server to Log User Activity..... 50 Deactivate User Name Identification ......51 Username Display Setting screen ........52 View the Current Username Display Setting ....53 Modify the Username Display Setting......53 Page View Elapsed Time screen ........55 Establish the Unit of Elapsed Time for Page Views..
  • Page 6 ONTENTS Support Procedures ................ 81 Product Warranties ..............82 Standard Warranty ................82 Technical Support and Service ............83 Extended Warranty (optional) ............84 Extended Technical Support and Service ........84 ............. 85 PPENDICES ECTION Appendix A ................85 Evaluation Mode ................85 Administrator Console ..............
  • Page 7: Enterprise Reporter Overview

    The Enterprise Reporter (ER) from M86 Security is designed to readily obtain this information, giving the user the ability to interrogate massive datasets through flexible drill-down technology, until the desired view is obtained.
  • Page 8: How To Use This User Guide

    NTERPRISE EPORTER VERVIEW OW TO SE THIS UIDE How to Use this User Guide Organization This User Guide is organized into the following sections: • Overview - This section provides information on how to use this user guide to help you configure the ER Server. •...
  • Page 9: Conventions

    NTERPRISE EPORTER VERVIEW OW TO SE THIS UIDE Conventions The following icons are used throughout this user guide: NOTE: The “note” icon is followed by italicized text providing additional information about the current topic. TIP: The “tip” icon is followed by italicized text giving you hints on how to execute a task more efficiently.
  • Page 10: Terminology

    NTERPRISE EPORTER VERVIEW OW TO SE THIS UIDE Terminology The following terms are used throughout this user guide. Sample images (not to scale) are included for each item. • alert box - a message box that opens in response to an entry you made in a dialog box, window, or screen.
  • Page 11 NTERPRISE EPORTER VERVIEW OW TO SE THIS UIDE • field - an area in a dialog box, window, or screen that either accommodates your data entry, or displays pertinent information. A text box is a type of field. • frame - a boxed-in area in a dialog box, window, or screen that includes a group...
  • Page 12 NTERPRISE EPORTER VERVIEW OW TO SE THIS UIDE • radio button - a small, circular object in a dialog box, window, or screen used for selecting an option. This object allows you to toggle between two choices. By clicking a radio button, a dot is placed in the circle, indicating that you selected the option.
  • Page 13: Administrator Section

    • adds new administrators • sets up administrators for receiving automatic alerts • updates the Server with software updates supplied by M86 Security • analyzes Server statistics • utilizes diagnostics for monitoring the Server status to ensure optimum functioning of the Server •...
  • Page 14: Components And Environment

    DMINISTRATOR ECTION OMPONENTS AND NVIRONMENT Components and Environment Components Hardware • High performance server • One or more high-capacity hard drives • Optional: One or more attached “NAS” storage devices (e.g. Ethernet connected, SCSI/Fibre Channel connected “SAN”) Software • Linux OS •...
  • Page 15: Environment

    NOTE: Information about disabling pop-up blocking software can be found in Appendix B: Disable Pop-up Blocking Software. Network Requirements • High speed connection from the ER Server to the Client workstation(s) • HTTPS connection to M86 Security’s software update server M86 S ECURITY UIDE...
  • Page 16: Chapter 1: Accessing The Server

    Server so that it can be accessed via an IP address on your network. NOTE: If you do not have the M86 IR Administrator Installation Guide, contact M86 Security immediately to have a copy sent to you. WARNING: In order to prevent data from being lost or corrupted while the Server is running, the Server should be connected to a UPS or other battery backup system.
  • Page 17: Access Er Admin Module From The Ir Portal

    1: A DMINISTRATOR ECTION HAPTER CCESSING THE ERVER • by entering the ER Administrator’s URL in the Address field (see Enter ER Admin Module’s URL in Address field) Access ER Admin Module from the IR Portal 1. Launch an Internet browser window supported by the Enterprise Reporter.
  • Page 18: Enter Er Admin Module's Url In Address Field

    1: A DMINISTRATOR ECTION HAPTER CCESSING THE ERVER Clicking the ER Administration Module icon launches a separate browser window/tab containing the ER Admin- istrator console Login window (see Fig. 1:1-2). Enter ER Admin Module’s URL in Address field 1. Launch an Internet browser window supported by the ER Server.
  • Page 19: Log On

    1: A DMINISTRATOR ECTION HAPTER CCESSING THE ERVER Log On 1. In the login window, type in the generic Username admin, and Password reporter, if you have not yet set up your own user name and password. Otherwise, enter your personal Username and Password: Fig.
  • Page 20 1: A DMINISTRATOR ECTION HAPTER CCESSING THE ERVER Fig. 1:1-3 Server Status screen The Server Status screen displays the current status of the ER Server. NOTES: See Server Status screen in the Server section of this document for information about the contents and usage of this screen.
  • Page 21: Logging On The First Time

    1: A DMINISTRATOR ECTION HAPTER CCESSING THE ERVER Logging on the First Time Set up an Administrator Login ID NOTE: If you have already set up your user name and password, you can skip this section. 1. At the Network pull-down menu, choose Administrators to display the Add/Edit/Delete Administrators screen where you set up your user name and password: Fig.
  • Page 22: Log Off

    1: A DMINISTRATOR ECTION HAPTER CCESSING THE ERVER acter, and one special character. The password is case sensitive. 5. In the Confirm Password field, re-enter the password in the exact format used at the Password field. 6. Click the Save button. Log Off To log off the Administrator console, click the Logout link beneath the banner in any screen to display the logout...
  • Page 23: Chapter 2: Configuring The Er Server

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Chapter 2: Configuring the ER Server Administrator Console The Administrator console is used for configuring and main- taining the ER Server. Settings made in the Administrator console affect the Client reporting application. The Adminis- trator console includes three menus: Network, Server, and Database.
  • Page 24: Box Mode Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Box Mode screen The Box Mode screen displays when the Box Mode option is selected from the Network menu. The box mode indicates whether the Server box is functioning in the “live” mode, or in the “archive”...
  • Page 25: Archive Mode

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Archive Mode In the “archive” mode, the Server box solely functions as a receptacle in which historical, archived files are placed. In this mode, “old” files placed on the Server can be viewed using the Client reporting application.
  • Page 26: Add/Edit/Delete Administrators Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • choose Archive if you wish the Server to function in the “archive” mode, solely as a receptacle for histor- ical, archived files. In this mode, “old” files placed on the Server can be viewed using the Client reporting application.
  • Page 27: View A List Of Administrators

    ERVER TIPS: For security purposes, administrators should be the first users set up on the Server. M86 Security recommends adding an alternate login ID prior to editing or deleting the default login ID. By doing so, if one login ID fails, you have another you can use.
  • Page 28: Delete An Administrator

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER 3. Click the Save button. Delete an Administrator 1. Select the administrator’s user name from the pull-down menu. 2. After the administrator’s login ID information populates the fields, click the Delete button to remove the adminis- trator’s user name from the choices in the pull-down menu.
  • Page 29: Locked-Out Accounts And Ips Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Locked-out Accounts and IPs screen The Locked-out Accounts and IPs screen displays when the Lockouts option is selected from the Network menu. This screen is used for unlocking accounts or IP addresses of administrators and sub-administrators that are currently locked out of the Administrator console or Web Client.
  • Page 30: View Locked Accounts, Ip Addresses

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER NOTE: An account or IP address becomes locked if the Pass- word Security Options feature is enabled in the Optional Features screen, and a user is unable to log into the Administrator console or Web Client due to a password expiration, or having met the specified number of failed password attempts within the desig- nated timespan.
  • Page 31: Server Menu

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • IP: ‘x.x.x.x’ has been successfully unlocked. NOTE: In the text above, ‘xxx’ and ‘x.x.x.x’ represents the unlocked username/IP address. 3. Click OK to return to the Locked-out Accounts and IPs screen that no longer shows the accounts/IPs that have been unlocked.
  • Page 32: Backup Screen

    Fig. 1:2-5 Backup screen Backup and Recovery Procedures IMPORTANT: M86 Security recommends establishing backup and recovery procedures when you first begin using the ER Server. Please follow the advice in this section to ensure your ER Server is properly maintained in the event that data is lost and back up procedures need to be performed to recover data.
  • Page 33 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Although automatic backups to a local ER hard drive are scheduled nightly by default, it is important that the ER administrator implements a backup policy to ensure data integrity and continuity in the event of any possible failure scenario.
  • Page 34: Set Up/Edit External Backup Ftp Password

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Set up/Edit External Backup FTP Password In order to back up the ER Server’s database to a remote server, an FTP account must be established for the remote server. NOTE: In the External Backup FTP Account frame, the login name that will be used to access the remote server displays in the Username field.
  • Page 35: Perform A Remote Backup

    From the remote server, the backup database can be retrieved via FTP, and then stored off site. TIP: M86 Security recommends executing an on demand backup during the lightest period of system usage, so the Server will perform at maximum capacity.
  • Page 36: Perform A Restoration To The Er Server

    NOTE: The amount of time it will take to restore data to the ER Server depends on the combined size of all database tables being restored. M86 Security recommends that you do not perform other functions on the ER Server until the restoration is complete.
  • Page 37: Self Monitoring Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Self Monitoring screen The Self Monitoring screen displays when the Self-Moni- toring option is selected from the Server menu. This screen is used for setting up and maintaining e-mail addresses of contacts who will receive automated notifications if prob- lems occur with the network.
  • Page 38: View A List Of Contact E-Mail Addresses

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View a List of Contact E-Mail Addresses If this feature is currently activated, the e-mail address of the Master Administrator displays on this screen, along with any other contacts set up as Choice one - four. Set up and Activate Self-Monitoring 1.
  • Page 39: Server Status Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Server Status screen The Server Status screen displays when the Server Status option is selected from the Server menu. This screen, which automatically refreshes itself every 10 seconds, displays the statuses of processes currently running on the Server, and provides information on the amount of space and memory used by each process.
  • Page 40: View The Status Of The Server

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View the Status of the Server The Product Version number of the software displays at the top of the screen, along with the date that software version was implemented. Status information displays in the following sections of this screen: •...
  • Page 41: Secure Access Screen

    The Secure Access screen displays when the Secure Access option is selected from the Server menu. This screen is primarily used by M86 Security technical support representatives to perform maintenance on your Server, if your system is behind a firewall that denies access to your Server.
  • Page 42: Activate A Port To Access The Server

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Activate a Port to Access the Server 1. After the administrator at the customer’s site authorizes you to use a designated port to access their Server, enter that number at the Port # field. 2.
  • Page 43: Terminate A Port Connection

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Terminate a Port Connection 1. After maintenance has been performed on the customer’s Server, select the active port number from the list box by clicking on it. 2. Click the Stop button to terminate the port connection. This action removes the port number from the list box.
  • Page 44: Software Update Screen

    Update option is selected from the Server menu. This screen is used for updating the Server with software updates supplied by M86 Security, and for viewing a list of software updates that are available and/or previously installed on the Server.
  • Page 45: View Installed Software Updates

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View Installed Software Updates Any software update previously installed on the Server displays in the ER Software Update History frame. For each installed software update, the Date installed (YYYY/MM/ DD), and software update Name and Description display. Uninstall the Most Recently Applied Software Update In the ER Software Update History frame, the most recently applied software update can be unapplied by clicking Undo.
  • Page 46: Install A Software Update

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Install a Software Update WARNING: Before installing a software update, you must shut off the Server’s software by selecting the Shutdown Software option on the Shut Down screen. (See the Shut Down sub- section under the Server menu section in this chapter.) All soft- ware updates must be installed in numerical order on your Server.
  • Page 47 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Apply Now: 1. Click Apply Now to open a dialog box containing infor- mation about the software release: Fig. 1:2-12 Software update dialog box 2. Click Yes to open the EULA dialog box: Fig.
  • Page 48 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER 3. After reading the contents of the End User License Agreement, click Yes if you agree to its terms. This action closes the EULA dialog box and begins the software update application process.
  • Page 49: Shut Down Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER NOTE: After installing the software update, if a message displays that informs you to reboot the Server, you should select the Restart Software option on the Shut Down screen. Shut Down screen The Shut Down screen displays when the Shut Down option is selected from the Server menu.
  • Page 50: Perform A Server Action

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER ware Restart process, files normally FTPed to the Server are routed to a problem directory in the Web Filter. When the Server is running again, these files are FTPed to the Server. •...
  • Page 51: Web Client Server Management Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Web Client Server Management screen The Web Client Server Management screen displays when the Web Client Server Management option is selected from the Server menu. This screen is used for enabling specified Web Client Server features.
  • Page 52: Enable/Disable The Web Client Scheduler

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Enable/Disable the Web Client Scheduler 1. In the Enable/Disable Web Client Schedule frame, click the appropriate radio button to specify whether or not to automatically run scheduled Web Client reports: •...
  • Page 53: Database Menu

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Database Menu The Database pull-down menu includes options for config- uring the database. These options are: IP.ID, Username Display Setting, Elapsed Time, Page Definition, Tools, Expi- ration, Optional Features, and User Group Import. User Name Identification screen The User Name Identification screen displays when the IP.ID option is selected from the Database menu.
  • Page 54 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Fig. 1:2-17 User Name Identification screen with IP.ID activated As the administrator of the Server, you have the option to either enable or disable this feature for logging users’ activ- ities by usernames, machine names, and/or IP addresses of machines.
  • Page 55 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER ARNINGS The ER will generate NetBIOS requests outside the network if IP.ID is activated and if no segment settings have been specified in the configuration of the Web Filter—causing it to log external traffic.
  • Page 56: View The User Name Identification Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View the User Name Identification screen If user name identification is enabled, specified IP.ID criteria displays, and IP, Machine, and Username frames will be populated if entries were previously made in them. NOTE: If this feature is disabled, checkboxes in the IP.ID (Microsoft Username Lookup) section display greyed-out.
  • Page 57: Deactivate User Name Identification

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER 4. In the IP/Machine/Username to ignore list boxes, enter all IP addresses, machine names, and/or usernames the Server should disregard when identifying users. Each entry should be made in a separate row. 5.
  • Page 58: Username Display Setting Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Username Display Setting screen This Username Display Setting screen displays when the Username Display Setting option is selected from the Data- base menu. This screen is used for configuring the user- name format imported from raw logs and customizing the username format that displays in reports.
  • Page 59: View The Current Username Display Setting

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View the Current Username Display Setting In the Current Username Display Setting frame, the current username format displays—if previously entered in the Display username field and saved on this screen. Modify the Username Display Setting In the Modify Username Display Setting frame, make selec- tions from list boxes and apply results for the new username...
  • Page 60 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER 4. Click Add to include your selection in the Display user- name field below. NOTE: Follow steps 3 and 4 for each field to be added to the Display username field below. Each additional selection added to the display name is preceded by a backslash ( \ ).
  • Page 61: Page View Elapsed Time Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Page View Elapsed Time screen The Page View Elapsed Time screen displays when the Elapsed Time option is selected from the Database menu. This screen is used for establishing the value—amount of time—that will be used when tracking the length of a user’s stay at a given Web site, and the number of times the user accesses that site.
  • Page 62: Elapsed Time Rules

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Elapsed Time Rules Each time a user on the network accesses a Web site, this activity is logged as one or more visit(s) to that site. The amount of time a user spends on that site and the number of times he/she accesses that site is tracked according to the following rules: •...
  • Page 63: Page Definition Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Page Definition screen The Page Definition screen displays when the Page Defini- tion option is selected from the Database menu. This screen is used for specifying the types of pages to be included in the detail report for Page searches.
  • Page 64: Remove A Page Type

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Remove a Page Type To remove a page type from the detail report: 1. Select the page extension from the Current page types list box. 2. Click Remove. 3. Click Apply. Add a Page Type To add a page type in the detail report: 1.
  • Page 65: Tools Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Tools screen The Tools screen displays when the Tools option is selected from the Database menu. This screen is used for viewing reports and logs to help you troubleshoot problems with the Client application.
  • Page 66: View Diagnostic Reports

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View Diagnostic Reports 1. Choose a report from the pull-down menu (Table Status, Process List, Full Process List, Tables, or Daily Summary). 2. Click the View button to view the selected diagnostic report in a pop-up window: •...
  • Page 67 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • db Expiration - This log includes information about expiring data on the Server. • db Expire Summary - This log provides a list of data expiration from summary tables. •...
  • Page 68 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • Software Update Log - This log gives information about applied software updates. • MYSQL Log - This log provides information pertaining to the MySQL server. • Error Entry - Web Filter - This log displays a list of Web Filter query errors.
  • Page 69: Expiration Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Expiration screen The Expiration screen displays when the Expiration option is selected from the Database menu. This screen shows statistics on the amount of data currently stored on the Server box, and provides an estimated date when that data will expire.
  • Page 70: Expiration Screen Terminology

    Internet, as well as the indexes for these items. When setting up the Server to store data, M86 Security recommends that you allocate the highest percentage possible for live data storage, since reports run faster if indexes are available for pages and objects.
  • Page 71: Expiration Rules

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • Expire - pertains to the action of dropping data from the Server when there is no room left on the hard drive for additional storage. When the hard drive reaches its maximum data storage capacity, indexes from the oldest week of data stored on the Server are dropped, or “expired”...
  • Page 72: View Data Storage Statistics

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER View Data Storage Statistics In the Status section of this screen, the date and time of the last database expiration displays in the Status bar. The date displays in the YYYY-MM-DD format, and the time displays in military time (01-24 hours) using the HH:MM:SS time format.
  • Page 73 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • Current archive data (yearweekno/date scope) - the range of dates and times of archive data currently stored on the Server. The first line displays the range of year(s) and weeks in the YYYYWW format, where “Y”...
  • Page 74 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • Last 8 weeks hits/day average - the average number of hits on the Server per day, based on the last eight weeks of data stored on the Server. The following data that displays is current as of the last changes made in the Change Settings section of the screen: •...
  • Page 75: Change Data Storage Settings

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Change Data Storage Settings The Change Settings section of the screen is used for updating the amount of data that will be stored on the Server box in the future. By making an entry in this section of the screen, you dictate how data on the box will expire.
  • Page 76: Optional Features Screen

    HAPTER ONFIGURING THE ERVER TIP: M86 Security recommends that you set up your Server to store more live data than archive data for the benefit of adminis- trators and sub-administrators who generate reports via the Client application. Report processing times are slower when generating reports that include non-indexed data.
  • Page 77 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Fig. 1:2-23 Optional Features screen M86 S ECURITY UIDE...
  • Page 78: Enable Search String Reporting

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER Enable Search String Reporting If Search String Reporting is enabled, detail drill down reports display the full search string content typed into a search engine text box for search sites such as Google, Bing, Yahoo!, MSN, AOL, Ask.com, YouTube.com, and MySpace.com.
  • Page 79: Enable Wall Clock Time

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER WARNING: Applying this setting restarts the Web Client server. NOTE: Since Executive Reports are processed each night, any changes made to settings today will not effective until the following day. Enable Wall Clock Time If Wall Clock Time is enabled, Wall Clock Time Reports can be generated by the administrator.
  • Page 80: Enable, Configure Password Security Option

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER 1. Select one of two radio buttons to specify the type of hits to be included in drill down, Wall Clock Time, and sched- uled custom reports: • “Pages only” - Choose this option to include only Web page hits in reports.
  • Page 81 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • At the Lockout by Username field, click the radio button corresponding to either of the following options: • ON - Choose this option to lock out the user by username if the incorrect password is entered—for the number of times specified in the Allowable Number of Failed Password Attempts field—within...
  • Page 82 2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER • Failed Password Attempts Timespan (in minutes) - With the Lockout by Username and/or Lockout by IP Address option(s) enabled, enter the number of minutes that defines the interval in which a user can enter an incorrect password—as specified in the Allowable Number of Failed Password Attempts field—...
  • Page 83: User Group Import Screen

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER User Group Import screen The User Group Import screen displays when the User Group Import option is selected from the Database menu. This screen is used for specifying Web Filter servers to send LDAP user group membership information to this ER Server, for performing a user group import on demand, and for viewing on demand user group import criteria.
  • Page 84: Import User Groups

    2: C ER S DMINISTRATOR ECTION HAPTER ONFIGURING THE ERVER WARNING: Be sure to import users and user groups whenever modifications are made to usernames in the Username Display Setting screen. See the Username Display Setting screen for information on modifying usernames. Import User Groups NOTE: Web Filter IP fields are populated by default if one or more Web Filter servers are connected to this ER server.
  • Page 85: Technical Support / Product Warranties

    ECHNICAL UPPORT RODUCT ARRANTIES Technical Support For technical support, visit M86 Security’s Technical Support Web page at http://www.m86security.com/ support/ or contact us by phone, by email, or in writing. Hours Regular office hours are from Monday through Friday, 8 a.m. to 5 p.m. PST.
  • Page 86: Office Locations And Phone Numbers

    ECHNICAL UPPORT RODUCT ARRANTIES ECHNICAL UPPORT Office Locations and Phone Numbers M86 Corporate Headquarters (USA) 828 West Taft Avenue Orange, CA 92865-4232 Local 714.282.6111 714.282.6116 Domestic US 1.888.786.7999 International +1.714.282.6111 M86 Taiwan 7 Fl., No. 1, Sec. 2, Ren-Ai Rd. Taipei 10055 Taiwan, R.O.C.
  • Page 87: Support Procedures

    ECHNICAL UPPORT RODUCT ARRANTIES ECHNICAL UPPORT Support Procedures When you contact our technical support department: • You will be greeted by a technical professional who will request the details of the problem and attempt to resolve the issue directly. • If your issue needs to be escalated, you will be given a ticket number for reference, and a senior-level technician will contact you to resolve the issue.
  • Page 88: Product Warranties

    ARRANTIES Product Warranties Standard Warranty M86 Security warrants the medium on which the M86 product is provided to be free from defects in material and workmanship under normal use for period of one year (the “Warranty Period”) from the date of delivery. This standard Warranty Period applies to both new and refurbished equip- ment for a period of one year from the delivery date.
  • Page 89: Technical Support And Service

    ARRANTIES RODUCT ARRANTIES Technical Support and Service M86 Security will provide initial installation support and technical support for up to 90 days following installation. M86 Security provides after-hour emergency support to M86 server customers. An after hours technician can be reached by voice line.
  • Page 90: Extended Warranty (Optional)

    If parts are discontinued from production during the Warranty Period, immediate replacement product(s) or hardware parts will be available for exchange with defective parts from M86 Security’s local reseller or distributor. Extended Technical Support and Service Extended technical support is available to customers under a Technical Support Agreement.
  • Page 91: Appendices Section

    PPENDICES ECTION PPENDIX PPENDICES ECTION Appendix A Evaluation Mode By default, the ER Server and Client are set to the evalua- tion mode. This appendix explains how to use the ER Server in the evaluation mode, and how to activate the ER Server to function in the activated mode.
  • Page 92 PPENDICES ECTION PPENDIX You have the option to either use the ER unit in the evalua- tion mode, or change the evaluation mode in one of two ways—by extending the evaluation period, or by activating the unit so that it can be used in the activated mode. NOTE: The message: “EVALUATION MODE - MAX DATA STORAGE ‘X’...
  • Page 93: Use The Server In The Evaluation Mode

    PPENDICES ECTION PPENDIX Use the Server in the Evaluation Mode To use the unit in the evaluation mode, click the "X" in the upper right corner of the ER Status pop-up box to close it. Expiration screen In the evaluation mode, the Expiration screen can only be used for viewing data storage statistics, and not for modi- fying data storage capacity criteria.
  • Page 94: Change The Evaluation Mode

    PPENDICES ECTION PPENDIX When the Server is in the evaluation mode, the following message displays at the top of the screen: “Evaluation Mode – Max Data Storage ‘X’ Weeks” (in which ‘X’ repre- sents the maximum number of weeks in the ER’s data storage scope).
  • Page 95: Activation Page

    2. In the message “Please click here to activate your appli- ance.”, click the link ‘here’ to open the Product Activation page at the M86 Security Web site. 3. In this Web page: a. Enter your following information: Contact Details, Company Information, and Enterprise Reporter Infor- mation.
  • Page 96: Disable Pop-Up Blocking Software

    PPENDICES ECTION PPENDIX Appendix B Disable Pop-up Blocking Software A user with pop-up blocking software installed on his/her workstation will need to disable pop-up blocking in order to use the Client. This appendix provides instructions on how to disable pop- up blocking software for the following products: Yahoo! Toolbar, Google Toolbar, AdwareSafe, and Windows XP Service Pack 2 (SP2).
  • Page 97 PPENDICES ECTION PPENDIX 2. Choose Always Allow Pop-Ups From to open the Yahoo! Pop-Up Blocker dialog box: Fig. B-2 Allow pop-ups from source 3. Select the source from the Sources of Recently Blocked Pop-Ups list box to activate the Allow button. 4.
  • Page 98: Google Toolbar Pop-Up Blocker

    PPENDICES ECTION PPENDIX Google Toolbar Pop-up Blocker Add the Client to the White List To add the Client to the white list so that it will always be allowed to pass, go to the Google Toolbar and click the # blocked icon: Fig.
  • Page 99: Adwaresafe Pop-Up Blocker

    PPENDICES ECTION PPENDIX AdwareSafe Pop-up Blocker Disable Pop-up Blocking AdwareSafe’s SearchSafe toolbar lets you toggle between enabling pop-up blocking (# popups blocked) and disabling pop-up blocking (Popup protection off) by clicking the pop- up icon. 1. In the IE browser, go to the SearchSafe toolbar and click the icon for # popups blocked to toggle to Popup protec- tion off.
  • Page 100: Windows Xp Sp2 Pop-Up Blocker

    PPENDICES ECTION PPENDIX Windows XP SP2 Pop-up Blocker This sub-section provides information on setting up pop-up blocking and disabling pop-up blocking in Windows XP SP2. Set up Pop-up Blocking There are two ways to enable the pop-up blocking feature in the IE browser.
  • Page 101: Use The Ie Toolbar

    PPENDICES ECTION PPENDIX Use the IE Toolbar In the IE browser, go to the toolbar and select Tools > Pop- up Blocker > Turn On Pop-up Blocker: Fig. B-6 Toolbar setup When you click Turn On Pop-up Blocker, this menu selec- tion changes to Turn Off Pop-up Blocker and activates the Pop-up Blocker Settings menu item.
  • Page 102: Add The Client To The White List

    PPENDICES ECTION PPENDIX Add the Client to the White List There are two ways to disable pop-up blocking for the Client and to add the Client to your white list. Use the IE Toolbar 1. With pop-up blocking enabled, go to the toolbar and select Tools >...
  • Page 103: Use The Information Bar

    PPENDICES ECTION PPENDIX Use the Information Bar With pop-up blocking enabled, the Information Bar can be set up and used for viewing information about blocked pop- ups or allowing pop-ups from a specified site. Set up the Information Bar 1. Go to the toolbar and select Tools > Pop-up Blocker > Pop-up Blocker Settings to open the Pop-up Blocker Settings dialog box (see Fig.
  • Page 104 PPENDICES ECTION PPENDIX 3. Click Yes to add the Client to your white list and to close the dialog box. NOTE: To view your white list, go to the Pop-up Blocker Settings dialog box (see Fig. B-7) and see the entries in the Allowed sites list box.
  • Page 105: Index

    NDEX Access Client 46 add/edit/delete administrators 15 Add/Edit/Delete Administrators screen 20 administrator e-mail contact setup 31 log in to Server 15 Administrator console 17 alert box, terminology 4 archive data setup on Server 63 terminology 64 back up data internal on demand backup 28 to remote server 29 backup procedures 26...
  • Page 106 NDEX Date Scope Expiration screen 63 diagnostic reports 59 dialog box, terminology 4 disable pop-up blockers 90 Elapsed Time 55 ER Client 17 diagnostic reports 60 evaluation mode 85 troubleshoot problems 59 expiration 65 Expiration screen 63 expire data from Server 63 passwords 74 terminology 65 field, terminology 5...
  • Page 107 NDEX software update 40 Installation Guide 10 Internet Explorer 9 IP.ID 47 LDAP 77 Linux OS 8 list box, terminology 5 live data setup on Server 63 terminology 64 Locked-out Accounts and IPs screen 23 lockout 75 database status 60 off the Server 16 on the Server 13 Macintosh 9...
  • Page 108 NDEX password create for Administrator GUI 15 create for remote server’s FTP account 28 security option 74 pop-up blocking, disable 90 pop-up box/window, terminology 5 Product Warranties section 82 pull-down menu, terminology 5 radio button, terminology 6 remote server backup 29 reports diagnostic 60 restart the Server 43...
  • Page 109 NDEX system requirements 9 table, terminology 6 technical support 35 Terminology 4 text box, terminology 6 Tools screen 59 update software 38 User Group Import screen 77 User Name Identification screen 47 Username Display Setting screen 52 view diagnostic reports 60 Wall Clock Time 73 Web Client Server Management screen 45 Web Filter 1...
  • Page 110 NDEX M86 S ECURITY UIDE...

Table of Contents