![M86 Security Threat Analysis Reporter User Manual Download Page 119](http://html1.mh-extra.com/html/m86-security/threat-analysis-reporter/threat-analysis-reporter_user-manual_3144283119.webp)
A
DMINISTRATION
S
ECTION
C
HAPTER
1: V
IEW
THE
U
SER
P
ROFILES
L
IST
M86 S
ECURITY
U
SER
G
UIDE
109
Chapter 1: View the User Profiles List
The User Profiles panel contains the list of users that is
created when TAR first communicates with the source Web
Filter. This list is used for verifying that the list of active end
users on the source Web Filter matches the list of end users
on the TAR server. If there are any discrepancies, synchro-
nization can be forced between the two servers (see
Chapter 4: Maintain the Device Registry).
The User Profiles panel is available to a group administrator
only if permissions were granted by the administrator who
set up his/her account, as detailed in Chapters 2 and 3 of
the Preliminary Setup Section.
In the navigation toolbar, with the Administration tab
selected, click
User Profiles
to display the User Profiles
panel:
Fig. 4:1-1 View User Profiles list
By default, this panel is comprised of rows of end user
records, sorted in ascending order by User Name (IP
address). For each user name in the list, the corresponding
end user IP Address displays.