Sign In
Upload
Manuals
Brands
M86 Security Manuals
Network Hardware
M86 Threat Analysis Reporter
M86 Security M86 Threat Analysis Reporter Manuals
Manuals and User Guides for M86 Security M86 Threat Analysis Reporter. We have
2
M86 Security M86 Threat Analysis Reporter manuals available for free PDF download: User Manual
M86 Security M86 Threat Analysis Reporter User Manual (938 pages)
Web Filtering and Reporting Suite
Brand:
M86 Security
| Category:
Network Hardware
| Size: 13.6 MB
Table of Contents
User Guide
1
Table of Contents
3
Wfr Suite Overview
29
How to Use this User Guide
30
Organization
30
Conventions
31
Components and Environment
32
Components
32
Hardware
32
Software
32
Environment
33
Administrator Workstation Requirements
33
Network Requirements
33
End User Workstation Requirements
34
How to Use the WFR on the Web
35
Initial Setup
35
Access the WFR Welcome Window
35
Single Sign-On Access
37
Access All Applications from the SR UI
37
Default Usernames and Passwords
38
Technical Support / Product Warranties
38
Web Filter Introductory Section
39
Web Filter
39
About this Portion of the User Guide
39
Terminology
41
Overview
46
Chapter 1: Filtering Operations
47
Operational Modes
47
Invisible Mode
48
Router Mode
50
Firewall Mode
51
Global Group
53
Group Types
53
IP Groups
54
Filtering Profile Types
55
Individual IP Member Filtering Profile
57
IP Sub-Group Filtering Profile
57
Master IP Group Filtering Profile
57
Static Filtering Profiles
57
Active Filtering Profiles
58
Global Filtering Profile
58
Lock Profile
58
Override Account Profile
58
Time Profile
58
Filtering Profile Components
59
Custom Categories
60
Library Categories
60
M86 Supplied Categories
60
Minimum Filtering Level
61
Rules
61
Service Ports
61
Filter Settings
62
Filtering Levels Applied
63
Filtering Rules
63
Chapter 2: Logging and Blocking
66
Web Access Logging
66
Instant Messaging, Peer-To-Peer Blocking
66
How IM and P2P Blocking Works
66
IM Blocking
66
P2P Blocking
67
Setting up IM and P2P
68
Using IM and P2P
68
Block IM, P2P for All Users
69
Block Specified Entities from Using IM, P2P
70
Chapter 3: Synchronizing Multiple Units
71
Web Filter Synchronization
71
Synchronization Setup
73
Setting up a Source Server
73
Setting up a Target Server
73
Filtering Profile Synchronization Process
74
Types of Synchronization Processes
74
Library Synchronization Process
75
Delays in Synchronization
76
Synchronized, Non-Synchronized Items
77
Functionally Synchronized Items
78
Synchronize All Items
78
Synchronized Items (All)
78
Non-Synchronized Items
79
Functionally Synchronized Items
80
Non-Synchronized Items
80
Synchronize Only Library Items
80
Synchronized Items (Library Only)
80
Establish Backup Procedures
82
Server Maintenance Procedures
82
Source Server Failure Scenarios
82
Set up a Target Server as a Source Server
83
Use a Backup File to Set up a Source Server
83
Set up a New Source Server from Scratch
84
Set up a Replacement Target Server
84
Set up a Target Server as a Source Server
84
Chapter 4: Getting Started
85
Using the Administrator Console
85
Access the Web Filter from the WFR Portal
85
Access the Web Filter Login Window
85
Enter Web Filter's URL in the Address Field
86
Log in
87
Last Library Update Message
88
Access Main Sections
90
Navigation Tips
90
Help Features
92
Screen and Window Navigation
95
Navigate a Tree List
97
Navigate a Window with Tabs
99
Console Tips and Shortcuts
100
Log out
104
Wf Global Administrator Section
105
Introduction
105
Chapter 1: System Screen
106
Control
108
Filter Window
108
Local Filtering
109
HTTP Filtering
110
HTTPS Filtering
111
Service Control
112
Target(S) Filtering
113
Block Page Authentication Window
114
Enter, Edit Block Page Options
115
Block Page
116
Options Page
118
Shut down the Server
121
Shutdown Window
121
Reboot the Server
122
Reboot Window
122
LAN Settings Window
124
Network
124
Specify LAN Settings
125
NTP Servers Window
126
Specify Network Time Protocol Servers
127
Regional Setting Window
128
Specify the Time Zone, Language Set
128
Block Page Route Table Window
129
Add a Router
130
Remove a Router
130
Administrator
131
Administrator Window
131
Add an Administrator Account
132
View Administrator Accounts
132
Delete an Administrator Account
133
Edit an Administrator Account
133
Logon Settings Window
134
Secure Logon
134
Enable, Disable Password Expiration
135
Enable, Disable Account Lockout
136
Logon Management
138
View User Account Status, Unlock Username
139
View Locked IP Address, Unlock IP Address
140
View Admin, Sub Admin User Interface Access
141
Diagnostics
142
System Command Window
142
Perform a Diagnostic Test, View Data
143
Command Selections
144
View Log File Window
148
View Log Results
148
Troubleshooting Mode Window
150
Use the Troubleshooting Mode
151
Active Profile Lookup Window
152
Verify Whether a Profile Is Active
153
Admin Audit Trail
156
Admin Audit Trail Window
156
Specify Ftp Criteria
157
View
158
Alert
159
Alert Settings Window
159
Disable the Alert Feature
161
Enable the Alert Feature
161
Modify Alert Settings
161
Enter, Edit SMTP Server Settings
162
SMTP Server Settings Window
162
Verify SMTP Settings
163
Local Software Update Window
164
Software Update
164
Read Information about a Software Update
165
Select and Apply a Software Update
166
Undo an Applied Software Update
170
Software Update Log Window
171
View Log Contents
171
Download Log, View, Print Contents
172
View the Contents of the Log
173
Synchronization
176
Setup Window
177
Using Only One Web Filter on the Network
177
Using more than One Web Filter on the Network
178
Status Window
183
View Items in the Queue
184
View the Sync Status of Targets from the Source
184
View Items Previously Synced to the Server
185
Place Items in Queue for Syncing
186
View the Sync Status of the Target Server
186
Mode
188
Operation Mode Window
188
Set the Operation Mode
189
Specify the Block Page Device
189
Specify the Listening Device
189
Invisible Option: Specify the Block Page Delivery
190
ICAP Option: Specify ICAP Server Settings
191
Apply Operation Mode Settings
193
Mobile Option: Specify the Mobile Client Control
193
Proxy Environment Settings Window
193
Enable HTTPS Filtering
194
Use a Local Proxy Server
194
Use Proxy Port 80
194
Authentication
195
Backup/Restore
196
Backup/Restore Window
196
Backup Procedures
197
Perform a Backup on Demand
198
Schedule a Backup
199
Create a Backup Schedule
200
Download a File
204
Perform a Restoration
205
Remove a Backup File
206
View Backup and Restoration Details
207
Reset
208
Reset Window
208
Radius Authentication Settings
209
Radius Authentication Settings Window
209
Enable Radius
210
Disable Radius
211
Enable SNMP
212
Snmp
212
SNMP Window
212
Specify Monitoring Settings
213
Hardware Failure Detection
214
Hardware Failure Detection Window
214
View the Status of the Hard Drives
215
Strikes Blocking
216
Strikes Blocking Window
216
Configuration
217
Lock Page
218
Overblocking or Underblocking
219
Email Alert
221
Set up Email Alert Recipients
222
Logon Accounts
223
Categories
225
Go to X Strikes Unlock Workstation GUI
226
Strikes Unlock Workstation
227
Warn Option Setting
230
Warn Option Setting Window
230
Specify Interval for Re-Displaying the Warn Page
231
Customization
232
Common Customization Window
233
Enable, Disable Features
234
Lock Page Customization Window
236
Edit Entries, Setting
237
Preview Sample Lock Page
238
Block Page Customization Window
239
Add, Edit Entries
240
Preview Sample Block Page
241
Warn Page Customization Window
243
Add, Edit Entries
244
Preview Sample Warning Page
245
Profile Control Window
247
Edit Entries
248
Add, Edit Entries
249
Quota Block Page Customization Window
249
Preview Sample Quota Block Page
250
Add, Edit Entries
252
Quota Notice Page Customization Window
252
Preview Sample Quota Notice Page
253
CMC Management
255
Software Update Management Window
255
View Software Update Information
255
Apply or Undo a Software Update
257
Status Window
258
View Filtering Status Information
258
Quota Setting
260
Quota Setting Window
260
Configure Quota Hit Settings
261
Reset Quotas
262
Delete a Quota Reset Time from the Schedule
263
Quota Notice Page
263
Quota Block Page
265
SSL Certificate
266
SSL Certificate Window
266
Chapter 2: Policy Screen
267
Global Group
269
Range to Detect Window
269
Add a Segment to the Network
270
Range to Detect Setup Wizard
272
Range to Detect Advanced Settings
277
Modify a Segment of the Network
278
Remove a Segment from the Network
278
Rules Window
279
View Criteria for a Rule
279
Add a Rule
280
Copy a Rule
282
Modify a Rule
282
Global Group Profile Window
283
Remove a Rule
283
Category Profile
284
Port
286
Default Redirect URL
287
Filter Options
288
Override Account Window
292
Add an Override Account
293
Edit an Override Account
300
Delete an Override Account
301
Approved Content Feature and Vusafe
302
Approved Content Settings Window
302
Approved Content Setup and Configuration
303
Minimum Filtering Level Window
305
Minimum Filtering Categories
306
Port
308
Minimum Filtering Bypass Options
309
Refresh All
310
Refresh All Main Branches
310
Add a Master IP Group
311
Add Group
311
Refresh
312
Refresh IP Groups
312
Chapter 3: Library Screen
313
Configuration Window
315
Set a Time for Updates to be Retrieved
315
Updates
315
Optional: Specify a Proxy Server
316
Select the Log Level
316
Manual Update Window
317
Specify the Type of on Demand Update
317
Additional Language Support Window
319
Select Additional Languages
319
Library Update Log Window
320
View the Library Update Process
320
Download Log, View, Print Contents
321
Emergency Update Log Window
325
View the Emergency Software Update Process
325
Download the Software Update Log File
326
Library Lookup
327
Library Lookup Window
327
URL Lookup, Removal
327
Search Engine Keyword Lookup, Removal
329
Reload the Library
330
Customer Feedback Module
331
Customer Feedback Module Window
331
Disable Customer Feedback Module
332
Enable Customer Feedback Module
332
Category Weight System
335
Category Weight System Window
335
Method for Weighting Library Categories
336
View the Current Selections
336
Weighting Library Categories
337
Add a Newsgroup to the Library
338
NNTP Newsgroup
338
NNTP Newsgroup Window
338
Remove a Newsgroup from the Library
339
Pattern Detection Whitelist
340
Pattern Detection Whitelist Window
340
Create, Maintain a Whitelist of IP Addresses
341
Category Groups
342
Library Details Window
343
View Library Details
343
Urls Window
344
View a List of Urls in the Library Category
345
Add or Remove Urls, Reload the Library
346
Remove a Url from the Library Category
348
URL Keywords Window
349
Add or Remove URL Keywords
350
View a List of URL Keywords
350
Upload a List of URL Keywords to the Library
351
Reload the Library
352
Upload a List of Url Keyword Deletions
352
Search Engine Keywords Window
353
Add or Remove Search Engine Keywords
354
View a List of Search Engine Keywords
354
Upload a List of Search Engine Keywords
355
Reload the Library
356
Upload a List of Search Engine Keyword Deletions
356
Chapter 4: Reporting Screen
357
Execute Log Transfer Now
358
Report Configuration
358
Report Configuration Window
358
Configuration
359
Real Time Probe
359
Real Time Probe Window
359
Report Recipients
361
Remove Email Addresses
362
Set up Email Addresses to Receive Reports
362
Logon Accounts
363
Go to Real Time Probe Reports GUI
365
Real Time Probe Reports
366
Create a Real Time Probe
367
View Real Time Probe Details
370
Usage Graphs
374
Usage Graphs Window
374
Select a Graph to View
375
Daily Peaks
376
Shadow Log Format
377
Shadow Log Format Window
377
Specify the Shadow Log Format
377
Apply Setting
378
Wf Group Dministrator Ection
379
Introduction
379
Wf G Roup a Dministrator S Ection
379
Chapter 1: Policy Screen
380
Refresh
381
Refresh the Master IP Group, Member
381
Change the Group Administrator Password
382
Group Details Window
382
Master IP Group
382
Members Window
383
Add the IP Address of the Member
384
Remove a Member from the Group
384
Override Account Window
385
Add an Override Account
386
Edit an Override Account
393
Category Profile
394
Delete an Override Account
394
Group Profile Window
394
Redirect URL
398
Filter Options
399
Exception URL Window
402
Valid URL Entries
403
Add Urls to Block URL or Bypass URL Frame
404
Remove Urls from Block URL or Bypass URL Frame
407
Apply Settings
408
Time Profile Window
408
Add a Time Profile
409
Delete a Time Profile
419
Modify a Time Profile
419
Approved Content Settings Window
420
Approved Content Setup and Configuration
420
Upload IP Profiles
423
Upload/Download IP Profile Window
423
Download Profile
425
Add an IP Sub Group
426
Add Sub Group
426
Add an Individual IP Member
427
Add Individual IP
427
Delete a Master IP Group Profile
428
Delete Group
428
Paste a Copied IP Sub Group
428
Paste Sub Group
428
Sub Group
429
Sub Group (IP Group) Window
429
View IP Sub-Group Details
429
Add IP Sub-Group Details
430
Members Window
431
Modify Sub-Group Members
432
Sub Group Profile Window
432
Exception URL Window
433
Time Profile Window
433
Approved Content Settings Window
434
Copy an IP Sub-Group
435
Copy Sub Group
435
Delete an IP Sub-Group
435
Delete Sub Group
435
Individual IP
436
Member Window
436
Enter the IP Address of the Member
437
Exception URL Window
437
Individual IP Profile Window
437
Time Profile Window
437
Approved Content Settings Window
438
Delete an Individual IP Member
438
Delete Individual IP
438
Chapter 2: Library Screen
439
Library Lookup
440
Library Lookup Window
440
Look up a URL
441
Custom Categories
442
Look up a Search Engine Keyword
442
Add a Custom Library Category
443
Add Category
443
Refresh
444
Refresh the Library
444
Custom Library Category
445
Library Details Window
445
View, Edit Library Details
446
Urls Window
447
View a List of Urls in the Library Category
448
Add or Remove Urls or Wildcard Urls
449
Upload a Master List to the Library
451
Upload a Master List of Wildcard Urls
453
Reload the Library
455
URL Keywords Window
455
Add or Remove URL Keywords
456
View a List of URL Keywords
456
Reload the Library
457
Upload a List of URL Keywords to the Library
457
Search Engine Keywords Window
458
Add or Remove Search Engine Keywords
459
View a List of Search Engine Keywords
459
Delete a Custom Category
460
Delete Category
460
Reload the Library
460
Upload a Master List of Search Engine Keywords
460
Appendix A
461
Rule Criteria
462
Web Filter Appendices Section
461
Filtering Profile Format and Rules
461
Appendix B
465
Exclude Filtering <Server for Block Page> IP
466
Part II: Customize the Block Page
466
Create a Customized Block Page
466
Set up a Web Server
466
Part III: Restart the Web Filter
468
Html
469
Reference
469
CGI Written in Perl
471
Use Java Script to Post Form Data
472
CGI Written in C
473
Override Pop-Up Blockers
479
Create a Custom Block Page
465
Enable Block
465
Part I: Modify the Web Filter
465
Appendix C
479
Yahoo! Toolbar Pop-Up Blocker
480
Add Override Account to the White List
480
If Pop-Up Blocking Is Enabled
480
Google Toolbar Pop-Up Blocker
482
Add Override Account to the White List
482
If Pop-Up Blocking Is Enabled
482
Adwaresafe Pop-Up Blocker
483
If Pop-Up Blocking Is Enabled
483
Temporarily Disable Pop-Up Blocking
483
Mozilla Firefox Pop-Up Blocker
484
Add Override Account to the White List
484
Windows XP SP2 Pop-Up Blocker
486
Set up Pop-Up Blocking
486
Use the Internet Options Dialog Box
486
Temporarily Disable Pop-Up Blocking
487
Use the IE Toolbar
487
Add Override Account to the White List
488
Use the IE Toolbar
488
Use the Information Bar
489
Mobile Client
491
Appendix D
491
Environment Requirements
492
Workstation Requirements
492
Mobile Client Installed on a Mobile PC
493
Network Requirement
493
Remote Filtering Components
493
Work Flow Overview
493
Initial Setup
494
Mobile Client on the Network
494
Mobile Server Section
494
Network Operations Overview
494
Configure the Web Filter to Use the Mobile Mode
495
Add MAC Addresses to the Master IP Group
496
Select MAC Addresses for a Sub Group
497
View Sub Group MAC Addresses
498
Add a MAC Address to an Individual Member
499
Upload MAC Address File for IP Group
500
Troubleshoot MAC Addresses
501
Mobile Client Section
502
Download and Install the Deployment Kit
503
Access the Mobile Client Deployment Tool Window
506
Configure a New Package Set
507
Edit a Package Configuration
521
View Package Configuration Contents
523
MCU File Preparations
524
MC Deployment to Windows Computers
529
MC Deployment to Macintosh os X Computers
532
Mobile Client Removal from Computers
533
Glossary
536
Appendix E
536
Sr Introductory Section
543
Security Reporter Overview
543
About this Portion of the User Guide
544
Terminology
546
Getting Started
550
Procedures for Logging In, out
550
Access SR Report Manager from the WFR Portal
550
Access the Security Reporter Login Window
550
Enter Report Manager's URL in the Address Field
551
Log in
552
Re-Login
554
Expired Passwords
555
Forgot Your Password
556
Links in the Report Manager Navigation Toolbar
558
User Interface Navigation
558
Links in the System Configuration Navigation Toolbar
561
Log out
562
Sr System Onfiguration Ection
563
Introduction
563
Sr S Ystem C Onfiguration S Ection
563
Chapter 1: Access System Configuration
564
Chapter 2: Configuring the Server
565
Network Menu
565
Box Mode Screen
566
Live Mode
566
Archive Mode
567
Change the Box Mode
567
Locked-Out Accounts and Ips Screen
568
Unlock Accounts, IP Addresses
569
View Locked Accounts, IP Addresses
569
Backup Screen
570
Server Menu
570
Backup and Recovery Procedures
571
Execute a Manual Backup
572
Set Up/Edit External Backup FTP Password
572
Perform a Remote Backup
573
Perform a Restoration to the SR
574
Self Monitoring Screen
575
Deactivate Self-Monitoring
576
Remove Recipient from E-Mail Notification List
576
Set up and Activate Self-Monitoring
576
View a List of Contact E-Mail Addresses
576
Server Status Screen
577
View the Status of the Server
578
Activate a Port to Access the SR
579
Secure Access Screen
579
Terminate a Port Connection
580
Terminate All Port Connections
580
Shut down Screen
581
SR Action Selections
581
Perform a Server Action
582
Report Manager Screen
583
Restart the Report Manager
583
Enable/Disable the Report Manager Scheduler
584
Database Menu
585
User Name Identification Screen
585
Configure the Server to Log User Activity
588
View the User Name Identification Screen
588
Establish the Unit of Elapsed Time for Page Views
589
Page View Elapsed Time Screen
589
Elapsed Time Rules
590
Page Definition Screen
591
View the Current Page Types
591
Add a Page Type
592
Remove a Page Type
592
Tools Screen
593
View Database Status Logs
594
View Diagnostic Reports
594
Generate Technical Support Report Package
596
Expiration Screen
597
Expiration Rules
598
View Data Storage Statistics
599
Optional Features Screen
600
Enable Block Request Count
602
Enable Blocked Searched Keywords
602
Enable Search String Reporting
602
Enable Page And/Or Object Count
603
Enable Time Usage Reports
603
Enable, Configure Password Security Option
604
User Group Import Screen
607
Import User Groups
608
Advertisement
M86 Security M86 Threat Analysis Reporter User Manual (192 pages)
Brand:
M86 Security
| Category:
Security System
| Size: 3.2 MB
Table of Contents
User Guide
1
Table of Contents
3
Ntroductory Ection
11
Threat Analysis Reporter
11
About this User Guide
12
How to Use this User Guide
13
Conventions
13
Terminology
14
Environment Requirements
18
Workstation Requirements
18
Installation Prerequisite
19
Network Requirements
19
Getting Started
20
Initial Setup
20
Access the TAR Administrator Login Window
21
Procedures for Logging On, off
21
Log in
22
Navigation Toolbar Menu Links and Topics
23
Exit the User Interface
24
Navigation Tips and Conventions
25
Preliminary Setup Section
27
Introduction
27
Chapter 1: User Groups Setup
28
View User Group Information
30
User Group Status Key
30
View a List of Members in a User Group
30
Add a User Group
32
Add a New Pattern
33
Patterns Frame
33
M86 Security Ser Uide
34
Remove a Pattern
34
View Users Resolved by the Pattern
34
IP Ranges Frame
35
Specify an IP Range
36
Remove an IP Address Range
37
Single Users Frame
38
Add One or more Individual Users
39
Select Users to Add to the Assigned Users List
39
Use the Filter to Narrow Available Users Results
39
Remove Users from the Add Tab
40
Edit a User Group
41
Rebuild the User Group
42
Delete a User Group
42
Chapter 2: Admin Groups Setup
43
Add a Group
44
View, Edit an Admin Group's Permissions
46
View Admin Group Settings
46
Edit Admin Group Settings
47
Delete an Administrator Group
47
Chapter 3: Admins Setup
48
Add an Administrator Profile
49
View, Edit Admin Detail
52
View Admin Details
52
Edit Account Info
53
Delete Admin
54
Configuration Section
55
Introduction
55
Chapter 1: Gauge Components
56
Types of Gauges
56
Anatomy of a Gauge
57
How to Read a Gauge
58
Bandwidth Gauge Components
59
Gauge Usage Shortcuts
61
Chapter 2: Custom Gauge Setup, Usage
63
Add a Gauge
65
Specify Gauge Information
66
Define Gauge Components
67
M86 Security
67
Assign User Groups
68
Save Gauge Settings
69
Edit Gauge Settings
70
Modify a Gauge
70
Hide, Disable, Delete, Rearrange Gauges
72
Disable a Gauge
74
Hide a Gauge
74
Rearrange the Gauge Display in the Dashboard
74
Show a Gauge
74
Delete a Gauge
75
View End User Gauge Activity
76
View Overall Ranking
76
View a Gauge Ranking Table
77
Monitor, Restrict End User Activity
79
View User Summary Data
79
Access the Threat View User Panel
80
URL Gauges Tab Selection
80
Bandwidth Gauges Tab Selection
82
Manually Lock out an End User
83
Low Severity Lockout
84
End User Workstation Lockout
85
Low Severity URL, Medium Url/Bandwidth Lockout
85
Medium and High Severity Lockout
85
High Severity URL, Low/High Bandwidth Lockout
86
Chapter 3: Alerts, Lockout Management
87
Add an Alert
89
Configure Email Alerts
90
Email Alert Function
90
Receive Email Alerts
91
System Tray Alert Function
91
Lockout Function
92
View, Modify, Delete an Alert
93
View Alert Settings
94
Modify an Alert
95
Delete an Alert
96
View the Alert Log
97
Manage the Lockout List
99
View a Specified Time Period of Lockouts
100
Access User Summary Details
101
Unlock Workstations
101
Chapter 4: Analyze Usage Trends
102
View Trend Charts
103
View Activity for an Individual Gauge
103
View Overall Gauge Activity
105
Navigate a Trend Chart
106
View Gauge Activity for a Different Time Period
107
Analyze Gauge Activity in a Pie Chart
108
Analyze Gauge Activity in a Line Chart
109
Print a Trend Chart from an IE Browser Window
111
View In/Outbound Bandwidth Gauge Activity
111
Access Web Filter, er Applications
112
Access the er Administrator Console
112
Access the er Web Client Application
112
Access the Web Filter
112
Chapter 5: Identify Users, Threats
113
Perform a Custom Search
113
Specify Search Criteria
114
View Urls Within the Accessed Category
116
Administration Section
117
Introduction
117
Chapter 1: View the User Profiles List
119
Search the User Database
120
View End User Activity
120
Chapter 2: View Administrator Activity
121
Perform a Search on a Specified Activity
122
Search Results
124
Chapter 3: Maintain the Device Registry
125
Generate an SSL Certificate for TAR
127
Restart the TAR Server
127
Shut down the TAR Server
127
Web Filter Device Maintenance
128
View, Edit Web Filter Device Criteria
128
Add a Web Filter to the Device Registry
129
Delete a Web Filter from the Device Registry
129
M86 Security
130
Threat Analysis Reporter Maintenance
130
View TAR Device Criteria
130
Add, Remove a Bandwidth Range
131
Add an er to the Device Registry
132
ER Device Maintenance
132
Delete the er Device from the Registry
133
View, Edit er Device Criteria
133
View Other Device Criteria
134
View Patch Server Device Criteria
134
View SMTP Device Criteria
134
Sync All Devices
135
View NTP Server Device Criteria
135
View Proxy Server Device Criteria
135
Chapter 4: Perform Backup, Restoration
137
Execute a Backup on Demand
139
Restore User Settings
140
Restore to Factory Default Settings
141
Reset to Factory Default Settings Frame
141
Wizard Login Window
142
Confirm Password
143
Technical Support / Product Warranties
145
Technical Support
145
Contact Information
145
Domestic (United States)
145
E-Mail
145
Hours
145
International
145
M86 Corporate Headquarters (USA)
146
M86 Taiwan
146
Office Locations and Phone Numbers
146
Support Procedures
147
Product Warranties
148
Standard Warranty
148
Technical Support and Service
149
Extended Technical Support and Service
150
Extended Warranty (Optional)
150
Appendices Section
151
M86 Security Ser Uide
151
Advertisement
Related Products
M86 Security MSA
M86 Security M86 Web Filter
M86 Security M86 IR Enterprise Reporter
M86 Security Threat Analysis Reporter
M86 Security 350
M86 Security 550
M86 Security IR Web Filter
M86 Security R3000 HL
M86 Security R3000 MSA
M86 Security R3000 Series
M86 Security Categories
Network Hardware
Firewall
Security System
Server
Gateway
More M86 Security Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL