|
Anleitung Zusammenfassung
............................................................... 18 Step 2: View Bandwidth Trend Chart Data. ................................................................ 18 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE THREAT ANALYSIS REPORTER EVALUATION GUIDE OVERVIEW THREAT ANALYSIS REPORTER EVALUATION GUIDE Overview The Threat Analysis Reporter helps administrators manage internal Web-based threats by monitoring Internet usage information by user in real-time, and by providing proactive remediation tools to enforce the organization’s Acceptable Use Policy. Note to Evaluators Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appliance. Your interest in our company and product is greatly appreciated. This Evaluation Guide Is designed to provide product evaluators an efficient way to install, configure and exercise the main product features of the TAR. Install, Configure, and Test TAR To install the TAR appliance, configure the server, and to test the unit to ensure that reporting is operational, please refer to the step-by-step instructions in the Threat Analysis Reporter Quick Start Guide provided inside the carton containing the chassis. Please note that prior to reviewing TAR, the R3000 Internet Filter must already be installed; this appliance is required for sending logs to the Reporter. See the R3000 Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter. 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 1: ACCESS THE TAR WEB CLIENT STEP 1: LAUNCH IE CHAPTER 1: ACCESS THE TAR WEB CLIENT Step 1: Launch IE From your workstation, launch Internet Explorer to open an IE browser window. NOTE: If pop-up blocking software is installed on the workstation, it must be disabled. Information about disabling pop-up blocking software can be found in the TAR User Guide Appendix A: Disable Pop-up Blocking Software. Step 2: Type in the URL In the Address field of the browser window, type in the URL for the TAR server: (in which ‘x.x.x.x’ represents the IP address). This action opens the TAR login window, which serves as a portal for administrators to log into TAR. Login window Step 3: Log into the Application 1. In the Username field, type in your username. If you are logging in as the global administrator, enter the username registered during the quick start wizard procedures. If you are logging in as a group administrator, enter the username set up for you by the global administrator. 2. In the Password field, type in your password. If you are logging in as the global administrator, enter the password registered during the quick start wizard procedures. If you are logging in as a group administrator, enter the password set up for you by the global administrator. Asterisks display for each character entered. 3. Click the Log In button to open the application that displays the URL dashboard gauge view in the right panel by default. The navigation panel displays to the left, and in the panel above the system time and date display (in the HH:MM:SS/ MM.DD.YYYY format) beside the Logout button: 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 1: ACCESS THE TAR WEB CLIENT STEP 3: LOG INTO THE APPLICATION URL dashboard with URL gauges 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 2: DRILL DOWN INTO A URL GAUGE STEP 1: HOW TO READ A GAUGE CHAPTER 2: DRILL DOWN INTO A URL GAUGE This section will step you through the manual monitoring of users in real-time via the URL gauge dashboard. Note that this is simply one of many ways to use TAR to monitor insider threats. There is also a robust automated alert component that does not require the system administrator to be monitoring gauges in order to be notified of a violation in process. Step 1: How to Read a Gauge The graphic below describes how to read gauges on the URL dashboard: Anatomy of a gauge diagram Gauge Name The gauge name is the customized name of the gauge created by the administrator. TAR has five default sample gauges that correspond with five of 8e6’s super-categories: Adult Content, Security, Shopping, Bandwidth and Illegal. Administrators can create their own gauges as well as delete the default gauges. Score The score is the large number in the center of the gauge that is based upon the number of URL page hits (see NOTE below) that occur in this specific category in a given period of time. NOTES: In addition to page hits, TAR also counts “blocked object” hits. For reference, “pages hits” are files that typically end in .html and represent a main page view. “Object hits” are files that typically end in .gif or .jpg and represent image files. To streamline your task, TAR does not track a score for “non-blocked objects,” since these gauges are designed to provide a clear picture of how many times a user has requested a page, and objects are images hosted within a page. TAR includes blocked object data to cover inst...
Dieses Handbuch ist für folgende Modelle:Netzwerk - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Netzwerk - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Netzwerk - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)