![M86 Security Threat Analysis Reporter Скачать руководство пользователя страница 12](http://html1.mh-extra.com/html/m86-security/threat-analysis-reporter/threat-analysis-reporter_user-manual_3144283012.webp)
I
NTRODUCTORY
S
ECTION
A
BOUT
THIS
U
SER
G
UIDE
2
M86 S
ECURITY
U
SER
G
UIDE
About this User Guide
The Threat Analysis Reporter User Guide addresses the
network administrator designated to configure and manage
the TAR appliance on the network (referred to as the “global
administrator” throughout this user guide, since he/she has
all rights and permissions on the TAR appliance), as well as
administrators designated to manage user groups on the
network (referred to as “group administrators” throughout
this user guide).
This user guide is organized into the following sections:
• Introductory
Section
- This section provides general
information on how to use this user guide to help you
configure the TAR appliance.
• Preliminary Setup Section
- This section includes infor-
mation on creating and maintaining user accounts.
• Configuration
Section
- This section includes informa-
tion on configuring TAR to alert you to any end user
Internet activity not within your organization’s Internet
usage policies.
• Administration
Section
- This section includes func-
tions for maintaining the TAR appliance or its database.
•
Technical Support / Product Warranties Section
-
This section contains information on technical support
and product warranties
• Appendices
- Appendix A explains how to disable pop-
up blocking software installed on a workstation in order to
use TAR. Appendix B provides details on setting up and
using the System Tray feature for TAR alerts. Appendix C
includes information about RAID maintenance and trou-
bleshooting on a TAR “H”, “HL”, or “SL” server. Appendix
D features a glossary of technical terminology used in
this user guide.