C
ONFIGURATION
S
ECTION
C
HAPTER
3: A
LERTS
, L
OCKOUT
M
ANAGEMENT
86
8
E
6 T
ECHNOLOGIES
,
T
HREAT
A
NALYSIS
R
EPORTER
U
SER
G
UIDE
Receive email alerts
If an alert is triggered, an email message is sent to the
mailbox address(es) specified. This message includes the
following information:
• Subject: Alert triggered by user (username/IP address).
• Body of message: User (username/IP address) has trig-
gered the (Alert Name) alert with a threshold of ‘X’ (in
which “X” represents the alert threshold) on the (URL
dashboard gauge name) gauge.
Beneath this information, the date and time (YYYY-MM-
DD HH:MM:SS), and clickable URL display for each URL
accessed by the user that triggered this alert.
Lockout function
Configure automatic lockouts
To set up the lockout function:
1. Click the checkbox corresponding to “Lockout” to display
the Severity and Duration (hours) pull-down menus at the
right side of this window.
2. Specify the
Severity
of the end users’ lockout:
• Low - choosing this option opens the Lockout by Cate-
gories pop-up window (see Chapter 3: Custom Gauge
Setup, Usage - Fig. 3:2-15). Specify the library cate-
gory containing URLs the end user should not access.
• Medium - choosing this option will lock out an end user
from Internet access if he/she reaches the threshold
limit set up for the gauge.
• High - choosing this option will lock out an end user
from network access if he/she reaches the threshold
limit set up for the gauge.
Summary of Contents for TAR
Page 1: ... Threat Analysis Reporter USER GUIDE Model TAR Release 1 3 00 Manual Version 1 01 ...
Page 2: ...ii 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 4: ...iv 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Page 216: ...APPENDICES SECTION APPENDIX D 204 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...