![8e6 Technologies TAR User Manual Download Page 112](http://html.mh-extra.com/html/8e6-technologies/tar/tar_user-manual_445774112.webp)
C
ONFIGURATION
S
ECTION
C
HAPTER
5: V
IEW
U
SER
C
ATEGORY
A
CTIVITY
100
8
E
6 T
ECHNOLOGIES
,
T
HREAT
A
NALYSIS
R
EPORTER
U
SER
G
UIDE
Chapter 5: View User Category Activity
If there are certain end users who are generating excessive,
unwanted traffic on the network, or if some library catego-
ries containing URLs against your organization’s policies
are persistently being frequented, you can target offending
entities by performing a custom search to identify URLs
being accessed in such library categories.
Perform a custom search
View a list of Users who accessed a Category
To view a list of end users who accessed a specified library
category:
1. In the navigation panel, go to URL Dashboard and click
Custom Search to open the Custom Search pop-up
window:
Fig. 3:5-1 Custom Search
2. In the
User
box, select the username/IP address to high-
light it, or choose “All.”
3. In the
Category
box, select the library category to high-
light it.
Summary of Contents for TAR
Page 1: ... Threat Analysis Reporter USER GUIDE Model TAR Release 1 3 00 Manual Version 1 01 ...
Page 2: ...ii 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 4: ...iv 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 216: ...APPENDICES SECTION APPENDIX D 204 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...