Sign In
Upload
Manuals
Brands
M86 Security Manuals
Security System
Threat Analysis Reporter
M86 Security Threat Analysis Reporter Manuals
Manuals and User Guides for M86 Security Threat Analysis Reporter. We have
1
M86 Security Threat Analysis Reporter manual available for free PDF download: User Manual
M86 Security Threat Analysis Reporter User Manual (192 pages)
Brand:
M86 Security
| Category:
Security System
| Size: 3.2 MB
Table of Contents
User Guide
1
Table of Contents
3
Ntroductory Ection
11
Threat Analysis Reporter
11
About this User Guide
12
How to Use this User Guide
13
Conventions
13
Terminology
14
Environment Requirements
18
Workstation Requirements
18
Installation Prerequisite
19
Network Requirements
19
Getting Started
20
Initial Setup
20
Access the TAR Administrator Login Window
21
Procedures for Logging On, off
21
Log in
22
Navigation Toolbar Menu Links and Topics
23
Exit the User Interface
24
Navigation Tips and Conventions
25
Preliminary Setup Section
27
Introduction
27
Chapter 1: User Groups Setup
28
View User Group Information
30
User Group Status Key
30
View a List of Members in a User Group
30
Add a User Group
32
Add a New Pattern
33
Patterns Frame
33
M86 Security Ser Uide
34
Remove a Pattern
34
View Users Resolved by the Pattern
34
IP Ranges Frame
35
Specify an IP Range
36
Remove an IP Address Range
37
Single Users Frame
38
Add One or more Individual Users
39
Select Users to Add to the Assigned Users List
39
Use the Filter to Narrow Available Users Results
39
Remove Users from the Add Tab
40
Edit a User Group
41
Rebuild the User Group
42
Delete a User Group
42
Chapter 2: Admin Groups Setup
43
Add a Group
44
View, Edit an Admin Group's Permissions
46
View Admin Group Settings
46
Edit Admin Group Settings
47
Delete an Administrator Group
47
Chapter 3: Admins Setup
48
Add an Administrator Profile
49
View, Edit Admin Detail
52
View Admin Details
52
Edit Account Info
53
Delete Admin
54
Configuration Section
55
Introduction
55
Chapter 1: Gauge Components
56
Types of Gauges
56
Anatomy of a Gauge
57
How to Read a Gauge
58
Bandwidth Gauge Components
59
Gauge Usage Shortcuts
61
Chapter 2: Custom Gauge Setup, Usage
63
Add a Gauge
65
Specify Gauge Information
66
Define Gauge Components
67
M86 Security
67
Assign User Groups
68
Save Gauge Settings
69
Edit Gauge Settings
70
Modify a Gauge
70
Hide, Disable, Delete, Rearrange Gauges
72
Disable a Gauge
74
Hide a Gauge
74
Rearrange the Gauge Display in the Dashboard
74
Show a Gauge
74
Delete a Gauge
75
View End User Gauge Activity
76
View Overall Ranking
76
View a Gauge Ranking Table
77
Monitor, Restrict End User Activity
79
View User Summary Data
79
Access the Threat View User Panel
80
URL Gauges Tab Selection
80
Bandwidth Gauges Tab Selection
82
Manually Lock out an End User
83
Low Severity Lockout
84
End User Workstation Lockout
85
Low Severity URL, Medium Url/Bandwidth Lockout
85
Medium and High Severity Lockout
85
High Severity URL, Low/High Bandwidth Lockout
86
Chapter 3: Alerts, Lockout Management
87
Add an Alert
89
Configure Email Alerts
90
Email Alert Function
90
Receive Email Alerts
91
System Tray Alert Function
91
Lockout Function
92
View, Modify, Delete an Alert
93
View Alert Settings
94
Modify an Alert
95
Delete an Alert
96
View the Alert Log
97
Manage the Lockout List
99
View a Specified Time Period of Lockouts
100
Access User Summary Details
101
Unlock Workstations
101
Chapter 4: Analyze Usage Trends
102
View Trend Charts
103
View Activity for an Individual Gauge
103
View Overall Gauge Activity
105
Navigate a Trend Chart
106
View Gauge Activity for a Different Time Period
107
Analyze Gauge Activity in a Pie Chart
108
Analyze Gauge Activity in a Line Chart
109
Print a Trend Chart from an IE Browser Window
111
View In/Outbound Bandwidth Gauge Activity
111
Access Web Filter, er Applications
112
Access the er Administrator Console
112
Access the er Web Client Application
112
Access the Web Filter
112
Chapter 5: Identify Users, Threats
113
Perform a Custom Search
113
Specify Search Criteria
114
View Urls Within the Accessed Category
116
Administration Section
117
Introduction
117
Chapter 1: View the User Profiles List
119
Search the User Database
120
View End User Activity
120
Chapter 2: View Administrator Activity
121
Perform a Search on a Specified Activity
122
Search Results
124
Chapter 3: Maintain the Device Registry
125
Generate an SSL Certificate for TAR
127
Restart the TAR Server
127
Shut down the TAR Server
127
Web Filter Device Maintenance
128
View, Edit Web Filter Device Criteria
128
Add a Web Filter to the Device Registry
129
Delete a Web Filter from the Device Registry
129
M86 Security
130
Threat Analysis Reporter Maintenance
130
View TAR Device Criteria
130
Add, Remove a Bandwidth Range
131
Add an er to the Device Registry
132
ER Device Maintenance
132
Delete the er Device from the Registry
133
View, Edit er Device Criteria
133
View Other Device Criteria
134
View Patch Server Device Criteria
134
View SMTP Device Criteria
134
Sync All Devices
135
View NTP Server Device Criteria
135
View Proxy Server Device Criteria
135
Chapter 4: Perform Backup, Restoration
137
Execute a Backup on Demand
139
Restore User Settings
140
Restore to Factory Default Settings
141
Reset to Factory Default Settings Frame
141
Wizard Login Window
142
Confirm Password
143
Technical Support / Product Warranties
145
Technical Support
145
Contact Information
145
Domestic (United States)
145
E-Mail
145
Hours
145
International
145
M86 Corporate Headquarters (USA)
146
M86 Taiwan
146
Office Locations and Phone Numbers
146
Support Procedures
147
Product Warranties
148
Standard Warranty
148
Technical Support and Service
149
Extended Technical Support and Service
150
Extended Warranty (Optional)
150
Appendices Section
151
M86 Security Ser Uide
151
Appendix A
151
Disable Pop-Up Blocking Software
151
Yahoo! Toolbar Pop-Up Blocker
151
Add the Client to the White List
151
Google Toolbar Pop-Up Blocker
153
Add the Client to the White List
153
Adwaresafe Pop-Up Blocker
154
Disable Pop-Up Blocking
154
Mozilla Firefox Pop-Up Blocker
155
Add the Client to the White List
155
Windows XP SP2 Pop-Up Blocker
157
Set up Pop-Up Blocking
157
Use the Internet Options Dialog Box
157
Use the IE Toolbar
158
Add the Client to the White List
159
Use the IE Toolbar
159
Access the Client
160
Set up the Information Bar
160
Use the Information Bar
160
Appendix B
162
System Tray Alerts: Setup, Usage
162
LDAP Server Configuration
162
Create the System Tray Logon Script
162
Assign System Tray Logon Script to Administrators
166
Administrator Usage of System Tray
168
Use the TAR Alert Icon's Menu
168
Status of the TAR Alert Icon
169
View System Tray Alert Messages
170
Appendix C
171
RAID Maintenance and Troubleshooting
171
Part 1: Hardware Components
172
Part 2: Server Interface
172
LED Indicators in SL and HL Units
172
Front Control Panels on H, SL, and HL Units
174
Rear Panels on H and HL Units
176
Part 3: Troubleshooting
177
Hard Drive Failure
177
Step 1: Review the Notification Email
177
Step 2: Verify the Failed Drive in the Admin Console
178
Step 3: Replace the Failed Hard Drive
179
Step 4: Rebuild the Hard Drive
180
Power Supply Failure
181
Step 1: Identify the Failed Power Supply
181
Step 2: Unplug the Power Cord
181
Step 5: Contact Technical Support
181
Step 3: Replace the Failed Power Supply
182
Step 4: Contact Technical Support
182
Fan Failure
183
Identify a Fan Failure
183
Glossary
184
Appendix D
184
Index
187
Advertisement
Advertisement
Related Products
M86 Security HL
M86 Security MSA
M86 Security SL
M86 Security Categories
Network Hardware
Firewall
Security System
Server
Gateway
More M86 Security Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL