
SR I
NTRODUCTORY
S
ECTION
S
ECURITY
R
EPORTER
O
VERVIEW
M86 S
ECURITY
U
SER
G
UIDE
515
SR I
NTRODUCTORY
S
ECTION
Security Reporter Overview
M86’s Security Reporter (SR) application is comprised of
the System Configuration administrator console and Report
Manager.
Using System Configuration screens, the global adminis-
trator configures the SR to accept log files from the M86
Web Filter—and the M86 Secure Web Gateway, if this
filtering device is added to the device registry—“normalize”
the transferred data, and insert them into a MySQL data-
base the Report Manager accesses to provide snapshots of
end user Internet and/or network activity.
Using the Report Manager, the global administrator sets up
group administrator accounts and grants these users
access to designated sections in the Report Manager and
System Configuration console, as applicable.
Administrators consult Report Manager dashboards for a
high level picture of real time network Internet traffic, and
then drill down into the URL categories or bandwidth
gauges to quickly identify the source of user-generated Web
threats. For further investigation of end user Internet usage,
administrators generate productivity report views and inter-
rogate massive datasets until the desired view is obtained.
This “view” can be memorized and saved to a user-defined
report menu for repetitive, scheduled execution and distri-
bution.
If using an M86 Secure Web Gateway (SWG) appliance
with the WFR, security reports show potentially harmful end
user Internet/network activity that was halted by the SWG.
The SR targets threats to your network, thus arming you
with the capability to take immediate action for terminating
the source and securing your network.