C
ONFIGURE
, T
EST
THE
E
NTERPRISE
R
EPORTER
U
SE
E
NTERPRISE
R
EPORTER
D
RILL
D
OWN
R
EPORTS
8
E
6 T
ECHNOLOGIES
, E
NTERPRISE
R
EPORTER
E
VALUATION
G
UIDE
21
Click the URL link to launch the actual Web site viewed by the user to verify the
content that was accessed.
Step 4: Sort by “Content Type”
Sort by the column labeled “Content Type” by clicking that column header. This will
sort all records by the search type filtered on the R3000 Internet Filter. For
example, “
URL
” indicates a page request was blocked or allowed based on the
status of that URL in the 8e6 category library and “
Search KW
” indicates a user
typed in a prohibited word into a search engine text box. One of 8e6 Technologies’
differentiators is “
Proxy Pattern Blocking
,” which will show up in the “Content
Type” section if an Internet proxy site was blocked by 8e6’s proprietary proxy
signature detection.
After reviewing a suspected policy violator’s Internet activity in the Detail Drill
Down Report, the administrator will have firm evidence on the user’s
intent
, which
is critical forensic information to have in the event the investigation moves to the
disciplinary phase.
Step 5: Sort by “Search String”
Sort by the column labeled “Search String” by clicking that column header. This will
sort all records alphabetically for results that include search string information.
Search string content includes the actual text typed into a search engine text box
on popular search engine sites such as Google, Yahoo, Ask.com and MSN. For
example, if the end user typed in “recipes for chicken breast” in a search engine
request, that entire string will appear in this column, not simply the blocked
keywords within the request. This depth of detail helps clarify the intent of the end
user, which helps tremendously in investigations.
Search String column
In the next section, this guide will go through the final step in a typical investiga-
tion—creating a
Specific User Custom Report
.