background image

C

HAPTER

 2: D

RILL

 D

OWN

 

INTO

 

A

 URL G

AUGE

    

S

TEP

 1: H

OW

 

TO

 R

EAD

 

A

 G

AUGE

4

8

E

6 T

ECHNOLOGIES

, T

HREAT

 A

NALYSIS

 R

EPORTER

 E

VALUATION

 G

UIDE

C

HAPTER

 2: D

RILL

 D

OWN

 

INTO

 

A

 URL G

AUGE

This section will step you through the manual monitoring of users in real-time via 
the URL gauge dashboard. Note that this is simply one of many ways to use TAR 
to monitor insider threats. There is also a robust automated alert component that 
does not require the system administrator to be monitoring gauges in order to be 
notified of a violation in process.

Step 1: How to Read a Gauge

The graphic below describes how to read gauges on the URL dashboard:

Anatomy of a gauge diagram

Gauge Name

The gauge name is the customized name of the gauge created by the adminis-
trator. TAR has five default sample gauges that correspond with five of 8e6’s 
super-categories: Adult Content, Security, Shopping, Bandwidth and Illegal. 
Administrators can create their own gauges as well as delete the default gauges.

Score

The score is the large number in the center of the gauge that is based upon the 
number of URL page hits (see NOTE below) that occur in this specific category in 
a given period of time.

NOTES

: In addition to page hits, TAR also counts “blocked object” hits. For reference, 

“pages hits” are files that typically end in .html and represent a main page view. “Object 
hits” are files that typically end in .gif or .jpg and represent image files.

To streamline your task, TAR does not track a score for “non-blocked objects,” since these 
gauges are designed to provide a clear picture of how many times a user has requested a 
page, and objects are images hosted within a page. TAR includes blocked object data to 
cover instances in which harmful images are hosted on a non-harmful site.

Summary of Contents for Threat Analysis Reporter TAR HL/SL/MSA

Page 1: ...Threat Analysis Reporter EVALUATION GUIDE Models TAR HL SL MSA Software Version 1 3 00 Document Version 01 05 09...

Page 2: ...of this document However 8e6 Technologies makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose 8e6 Techn...

Page 3: ...Score 4 Time Span 5 Threat Level 5 Step 2 View Child Gauges 5 Step 3 View a List of Users Affecting a Child Gauge 6 Step 4 View an Individual User s Gauge Activity 6 Step 5 Take Action on an Individu...

Page 4: ...Time Span 14 CHAPTER 6 MONITOR BANDWIDTH GAUGES 15 Step 1 Select Bandwidth and Outbound 15 Step 2 Select the FTP Protocol Gauge 15 Step 3 Select Port 21 Child Gauge 16 Step 4 View the User Summary 16...

Page 5: ...mpany and product is greatly appreciated This Evaluation Guide Is designed to provide product evaluators an efficient way to install configure and exercise the main product features of the TAR Install...

Page 6: ...Login window Step 3 Log into the Application 1 In the Username field type in your username If you are logging in as the global administrator enter the username registered during the quick start wizard...

Page 7: ...CHAPTER 1 ACCESS THE TAR WEB CLIENT STEP 3 LOG INTO THE APPLICATION 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER EVALUATION GUIDE 3 URL dashboard with URL gauges...

Page 8: ...ple gauges that correspond with five of 8e6 s super categories Adult Content Security Shopping Bandwidth and Illegal Administrators can create their own gauges as well as delete the default gauges Sco...

Page 9: ...ceiling created by the administrator For example if the administrator creates a gauge with a threshold of 100 when the score reaches 67 the gauge dial will move into the red section of the dial and t...

Page 10: ...nsible for driving that gauge s score In this example double click the Spyware child gauge Open the child gauges window Step 4 View an Individual User s Gauge Activity In the Spyware window select the...

Page 11: ...ser from further accessing a category This action is called a manual lockout Lockouts can be defined from 30 minutes to eight hours or set for an unlimited amount of time until the administrator manua...

Page 12: ...OLOGIES THREAT ANALYSIS REPORTER EVALUATION GUIDE Step 7 View the Actual Web Page Visited by the User You can now view the full URL details for this specific user In this example select the first URL...

Page 13: ...3 CREATE A NEW URL GAUGE Step 1 Select the Gauges Menu Item In order to create a new custom gauge select the Gauges menu item from the left hand menu This action will open a pop up window see Step 2 S...

Page 14: ...a URL Trend Report for One Day to see the normal level of activity for that category and then set the threshold slightly above that level See Chapter 5 View a URL Trend Report for details on how to u...

Page 15: ...for each child category For example if you deemed Alcohol more critical than Art you would set a lower threshold for Alcohol Also you can choose a different gauge method other than All For example yo...

Page 16: ...per user so you can be automatically notified via email and the violating user will be automatically locked out once a threshold is exceeded Step 1 Select Alerts In the left hand menu tree click Poli...

Page 17: ...itored in the specific gauge only A Medium selec tion will lock out the user from Internet access altogether A High selection will lock out the users from all network protocols so they cannot access t...

Page 18: ...helpful for monitoring improvement of activity in a certain category as well as providing a good tool for setting appropriate thresholds for each TAR gauge Step 1 Access Trend Charts Click the Report...

Page 19: ...d and outbound activity This information can then be easily compared to the user s URL activity providing a complete picture of the user s Web behavior Step 1 Select Bandwidth and Outbound Select the...

Page 20: ...6 TECHNOLOGIES THREAT ANALYSIS REPORTER EVALUATION GUIDE Step 3 Select Port 21 Child Gauge Double click on Port 21 child gauge FTP Port 21 gauge Step 4 View the User Summary Select one of the IP addre...

Page 21: ...ES THREAT ANALYSIS REPORTER EVALUATION GUIDE 17 Step 5 View Port Traffic Select the FTP protocol from the list and click the Port View button The port traffic for this user will display for each of th...

Page 22: ...provement over time as well as providing a good tool for setting appropriate thresholds for each TAR bandwidth gauge Step 1 Select Bandwidth and Trend Chart Select the Bandwidth menu option in the lef...

Reviews: