![M86 Security Threat Analysis Reporter User Manual Download Page 6](http://html1.mh-extra.com/html/m86-security/threat-analysis-reporter/threat-analysis-reporter_user-manual_3144283006.webp)
C
ONTENTS
vi
M86 S
ECURITY
U
SER
G
UIDE
Chapter 4: Analyze Usage Trends ........................................... 92
View Trend Charts .......................................................................... 93
View activity for an individual gauge ......................................... 93
View overall gauge activity . ...................................................... 95
Navigate a trend chart .............................................................. 96
View gauge activity for a different time period ................... 97
Analyze gauge activity in a pie chart .................................. 98
Analyze gauge activity in a line chart ................................. 99
View In/Outbound bandwidth gauge activity .................... 101
Print a trend chart from an IE browser window ................. 101
Access Web Filter, ER Applications .............................................. 102
Access the Web Filter ............................................................. 102
Access the ER Web Client application ................................... 102
Access the ER Administrator console ..................................... 102
Chapter 5: Identify Users, Threats ......................................... 103
Perform a Custom Search ............................................................. 103
Specify Search Criteria . .......................................................... 104
View URLs within the accessed category ........................ 106
A
DMINISTRATION
S
ECTION
............................................ 107
Introduction ............................................................................. 107
Chapter 1: View the User Profiles List .................................. 109
Search the User Database ............................................................ 110
View End User Activity ........................................................... 110
Chapter 2: View Administrator Activity ................................. 111
Perform a Search on a Specified Activity ...................................... 112
Search results ......................................................................... 114
Chapter 3: Maintain the Device Registry .............................. 115
Generate an SSL Certificate for TAR ............................................ 117
Restart the TAR server ................................................................. 117
Shut down the TAR server ............................................................ 117
Web Filter Device Maintenance .................................................... 118
View, edit Web Filter device criteria ........................................ 118
Add a Web Filter to the device registry ................................... 119
Delete a Web Filter from the device registry ........................... 119
Threat Analysis Reporter Maintenance ......................................... 120