![M86 Security Threat Analysis Reporter Скачать руководство пользователя страница 113](http://html1.mh-extra.com/html/m86-security/threat-analysis-reporter/threat-analysis-reporter_user-manual_3144283113.webp)
C
ONFIGURATION
S
ECTION
C
HAPTER
5: I
DENTIFY
U
SERS
, T
HREATS
M86 S
ECURITY
U
SER
G
UIDE
103
Chapter 5: Identify Users, Threats
If there are certain end users who are generating excessive,
unwanted traffic on the network, or if some library catego-
ries containing URLs against your organization’s policies
are persistently being frequented, you can target offending
entities by performing a custom search to identify which
users, URLs, and port are being accessed.
Perform a Custom Search
In the navigation toolbar, mouse over the Report/Analysis
menu link and select
Custom Search
to display the Custom
Search panel:
Fig. 3:5-1 Custom Search, Users accordion opened
This panel displays the Search Criteria frame to the left with
the open Users accordion and closed Available Threats/
Groups accordion, Timespan and Top Results sliders,
Search button; and to the right, the empty Results target
frame.