![M86 Security Threat Analysis Reporter Скачать руководство пользователя страница 55](http://html1.mh-extra.com/html/m86-security/threat-analysis-reporter/threat-analysis-reporter_user-manual_3144283055.webp)
C
ONFIGURATION
S
ECTION
I
NTRODUCTION
M86 S
ECURITY
U
SER
G
UIDE
45
C
ONFIGURATION
S
ECTION
Introduction
The Configuration Section of this user guide is comprised of
five chapters with information on configuring and using TAR
to immediately alert you to any end user Internet activity not
within your organization’s Internet usage policies:
• Chapter 1: Gauge Components - This chapter describes
the types of gauges, the components of a gauge, how to
read a gauge, and how to perform shortcuts using
gauges.
• Chapter 2: Custom Gauge Setup, Usage - This chapter
explains how gauges are configured and monitored.
• Chapter 3: Alerts, Lockout Management - This chapter
explains how alerts are set up and used, and how to
manage end user lockouts.
• Chapter 4: Analyze Usage Trends - This chapter
explains how trend charts are used for assessing end
user Internet/network activity. For additional or historical
information about end user Internet usage trends, the
Web Filter’s user interface and the ER’s Web Client
reporting application and Administrator console can be
accessed from the TAR user interface—if an ER server is
installed and connected to the source Web Filter.
• Chapter 5: Identify Users, Threats - This chapter explains
how to perform a custom search on Internet/network
usage by a specified user, or for a specified threat or
threat group.