S
ECURITY
R
EPORTS
S
ECTION
I
NTRODUCTION
M86 S
ECURITY
U
SER
G
UIDE
817
S
ECURITY
R
EPORTS
S
ECTION
Introduction
This section of the user guide provides instructions to
administrators on how to utilize data from SWG logs for
monitoring end user Internet and network usage via security
reports.
•
Chapter 1: Security Reports - This chapter explains how
to use the four basic security reports: Blocked Viruses,
Security Policy Violations, Traffic Analysis, and Rule
Transactions.
•
Chapter 2: Security Report Wizard - This chapter
explains how to use the Report Wizard to create your
own customized security reports.
NOTES
: If the SR is connected to an SWG running software
version 9.2.X, reports may not be accurate since bypass transac-
tions (e.g. streaming) are not logged for the SR to process.
WARNING
: To prevent requested security reports from being
blocked by your email client, be sure to whitelist the SR’s source
email address in your email client. The source email address can
be found in System Configuration > Server > SMTP Server
Setting, in the “From Email Address” field.
Содержание M86 Threat Analysis Reporter
Страница 1: ...M86 Web Filtering and Reporting Suite USER GUIDE Software Version 4 2 00 Document Version 10 10 11...
Страница 28: ...CONTENTS xxviii M86 SECURITY USER GUIDE INDEX 887...
Страница 518: ...WEB FILTER APPENDICES SECTION APPENDIX D 490 M86 SECURITY USER GUIDE Fig D 20 Mobile Client Package Contents page...
Страница 938: ...INDEX 910 M86 SECURITY USER GUIDE...