background image

®  

 

Threat Analysis Reporter

EVALUATION

GUIDE

Models: TAR HL/SL/MSA

Software Version: 1.3.00

Document Version: 01.05.09

Summary of Contents for Threat Analysis Reporter TAR HL/SL/MSA

Page 1: ...Threat Analysis Reporter EVALUATION GUIDE Models TAR HL SL MSA Software Version 1 3 00 Document Version 01 05 09...

Page 2: ...of this document However 8e6 Technologies makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose 8e6 Techn...

Page 3: ...Score 4 Time Span 5 Threat Level 5 Step 2 View Child Gauges 5 Step 3 View a List of Users Affecting a Child Gauge 6 Step 4 View an Individual User s Gauge Activity 6 Step 5 Take Action on an Individu...

Page 4: ...Time Span 14 CHAPTER 6 MONITOR BANDWIDTH GAUGES 15 Step 1 Select Bandwidth and Outbound 15 Step 2 Select the FTP Protocol Gauge 15 Step 3 Select Port 21 Child Gauge 16 Step 4 View the User Summary 16...

Page 5: ...mpany and product is greatly appreciated This Evaluation Guide Is designed to provide product evaluators an efficient way to install configure and exercise the main product features of the TAR Install...

Page 6: ...Login window Step 3 Log into the Application 1 In the Username field type in your username If you are logging in as the global administrator enter the username registered during the quick start wizard...

Page 7: ...CHAPTER 1 ACCESS THE TAR WEB CLIENT STEP 3 LOG INTO THE APPLICATION 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER EVALUATION GUIDE 3 URL dashboard with URL gauges...

Page 8: ...ple gauges that correspond with five of 8e6 s super categories Adult Content Security Shopping Bandwidth and Illegal Administrators can create their own gauges as well as delete the default gauges Sco...

Page 9: ...ceiling created by the administrator For example if the administrator creates a gauge with a threshold of 100 when the score reaches 67 the gauge dial will move into the red section of the dial and t...

Page 10: ...nsible for driving that gauge s score In this example double click the Spyware child gauge Open the child gauges window Step 4 View an Individual User s Gauge Activity In the Spyware window select the...

Page 11: ...ser from further accessing a category This action is called a manual lockout Lockouts can be defined from 30 minutes to eight hours or set for an unlimited amount of time until the administrator manua...

Page 12: ...OLOGIES THREAT ANALYSIS REPORTER EVALUATION GUIDE Step 7 View the Actual Web Page Visited by the User You can now view the full URL details for this specific user In this example select the first URL...

Page 13: ...3 CREATE A NEW URL GAUGE Step 1 Select the Gauges Menu Item In order to create a new custom gauge select the Gauges menu item from the left hand menu This action will open a pop up window see Step 2 S...

Page 14: ...a URL Trend Report for One Day to see the normal level of activity for that category and then set the threshold slightly above that level See Chapter 5 View a URL Trend Report for details on how to u...

Page 15: ...for each child category For example if you deemed Alcohol more critical than Art you would set a lower threshold for Alcohol Also you can choose a different gauge method other than All For example yo...

Page 16: ...per user so you can be automatically notified via email and the violating user will be automatically locked out once a threshold is exceeded Step 1 Select Alerts In the left hand menu tree click Poli...

Page 17: ...itored in the specific gauge only A Medium selec tion will lock out the user from Internet access altogether A High selection will lock out the users from all network protocols so they cannot access t...

Page 18: ...helpful for monitoring improvement of activity in a certain category as well as providing a good tool for setting appropriate thresholds for each TAR gauge Step 1 Access Trend Charts Click the Report...

Page 19: ...d and outbound activity This information can then be easily compared to the user s URL activity providing a complete picture of the user s Web behavior Step 1 Select Bandwidth and Outbound Select the...

Page 20: ...6 TECHNOLOGIES THREAT ANALYSIS REPORTER EVALUATION GUIDE Step 3 Select Port 21 Child Gauge Double click on Port 21 child gauge FTP Port 21 gauge Step 4 View the User Summary Select one of the IP addre...

Page 21: ...ES THREAT ANALYSIS REPORTER EVALUATION GUIDE 17 Step 5 View Port Traffic Select the FTP protocol from the list and click the Port View button The port traffic for this user will display for each of th...

Page 22: ...provement over time as well as providing a good tool for setting appropriate thresholds for each TAR bandwidth gauge Step 1 Select Bandwidth and Trend Chart Select the Bandwidth menu option in the lef...

Reviews: