![8e6 Technologies TAR User Manual Download Page 14](http://html.mh-extra.com/html/8e6-technologies/tar/tar_user-manual_445774014.webp)
I
NTRODUCTORY
S
ECTION
A
BOUT
THIS
U
SER
G
UIDE
2
8
E
6 T
ECHNOLOGIES
,
T
HREAT
A
NALYSIS
R
EPORTER
U
SER
G
UIDE
About this User Guide
The Threat Analysis Reporter User Guide addresses the
network administrator designated to configure and manage
the TAR server on the network (referred to as the “global
administrator” throughout this user guide, since he/she has
all rights and permissions on the TAR server), as well as
administrators designated to manage user groups on the
network (referred to as “group administrators” throughout
this user guide).
This user guide is organized into the following sections:
• Introductory
Section
- This section provides general
information on how to use this user guide to help you
configure the TAR server.
• Preliminary Setup Section
- This section includes infor-
mation on creating and maintaining user accounts.
• Configuration
Section
- This section includes informa-
tion on configuring TAR to alert you to any end user
Internet activity not within your organization’s Internet
usage policies.
• Bandwidth Management Section
- This section
includes information on monitoring and managing
inbound and outbound traffic on your network.
• Administration
Section
- This section includes func-
tions for maintaining the TAR server or its database.
•
Technical Support / Product Warranties Section
-
This section contains information on technical support
and product warranties
• Appendices
- Appendix A explains how to disable pop-
up blocking software installed on a workstation in order to
use TAR. Appendix B provides details on setting up and
using the System Tray feature for TAR alerts. Appendix C
includes information about RAID maintenance and trou-
bleshooting on a TAR “H”, “HL”, or “SL” server. Appendix
Summary of Contents for TAR
Page 1: ... Threat Analysis Reporter USER GUIDE Model TAR Release 1 3 00 Manual Version 1 01 ...
Page 2: ...ii 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 4: ...iv 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 216: ...APPENDICES SECTION APPENDIX D 204 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...