C
ONFIGURATION
S
ECTION
I
NTRODUCTION
48
8
E
6 T
ECHNOLOGIES
,
T
HREAT
A
NALYSIS
R
EPORTER
U
SER
G
UIDE
C
ONFIGURATION
S
ECTION
Introduction
The Configuration Section of this user guide is comprised of
five chapters with information on configuring and using TAR
to immediately alert you to any end user Internet activity not
within your organization’s Internet usage policies:
• Chapter 1: Threat Score Setup - This chapter explains
how the global administrator assigns a threat score
“weight” to each library category on the source (primary)
R3000 connected to this TAR server. A threat score is a
component that influences gauge movement.
• Chapter 2: Custom Gauge Setup, Usage - This chapter
explains how gauges are configured and monitored.
• Chapter 3: Alerts, Lockout Management - This chapter
explains how alerts are set up and used, and how to
manage end user lockouts.
• Chapter 4: Analyze Web Usage Trends - This chapter
explains how URL trend reports are used for assessing
end user Internet/network activity. For additional or
historical information about end user Internet usage
trends, the R3000’s Real Time Probe interface—and the
ER’s Web Client reporting application, if the ER server is
installed and connected to the source R3000—can be
accessed from the TAR interface.
• Chapter 5: View User Category Activity - This chapter
explains how to perform a custom search on Internet/
network activity performed by a specified user or within a
specified category.
Summary of Contents for TAR
Page 1: ... Threat Analysis Reporter USER GUIDE Model TAR Release 1 3 00 Manual Version 1 01 ...
Page 2: ...ii 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 4: ...iv 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 216: ...APPENDICES SECTION APPENDIX D 204 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...