I
NTRODUCTORY
S
ECTION
T
HREAT
A
NALYSIS
R
EPORTER
8
E
6 T
ECHNOLOGIES
,
T
HREAT
A
NALYSIS
R
EPORTER
U
SER
G
UIDE
1
I
NTRODUCTORY
S
ECTION
Threat Analysis Reporter
As perimeter security becomes more mature, user-gener-
ated Web threats increase and become critical aspects of
maintaining networks. Network administrators need tools to
monitor these threats so management can enforce corpo-
rate Internet usage policies.
8e6's Threat Analysis Reporter (TAR) appliance is designed
to offer administrators or management dynamic, real time
graphical snapshots of their network’s Internet traffic,
supported by remediation tools to manage and control user-
generated Web threats. Working in conjunction with 8e6’s
R3000 Enterprise Filter, TAR interprets end user Internet
activity from the R3000’s logs and provides data that can be
viewed via an easy-to-read dashboard of gauges the admin-
istrator can drill down into, thereby identifying the source of
the threat.
Содержание TAR
Страница 1: ... Threat Analysis Reporter USER GUIDE Model TAR Release 1 3 00 Manual Version 1 01 ...
Страница 2: ...ii 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Страница 4: ...iv 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...
Страница 216: ...APPENDICES SECTION APPENDIX D 204 8E6 TECHNOLOGIES THREAT ANALYSIS REPORTER USER GUIDE ...