OneStart

M86 Security 350 Installation Manual

Also see for 350: Installation guide

Page 1 preview
Page 2 preview
Page 3 preview
Page 4 preview
Page 5 preview
Page 6 preview
Page 7 preview
Page 8 preview
Page 9 preview
Page 10 preview
Page 11 preview
Page 12 preview
Page 13 preview
Page 14 preview
Page 15 preview
Page 16 preview
Page 17 preview
Page 18 preview
Page 19 preview
Page 20 preview
Page 21 preview
Page 22 preview
Page 23 preview
Page 24 preview
Page 25 preview
Page 26 preview
Page 27 preview
Page 28 preview
Page 29 preview
Page 30 preview
Page 31 preview
Page 32 preview
Page 33 preview
Page 34 preview
Page 35 preview
Page 36 preview
Page 37 preview
Page 38 preview
Page 39 preview
Page 40 preview
Page 41 preview
Page 42 preview
Page 43 preview
Page 44 preview
Page 45 preview
Page 46 preview
Page 47 preview
Page 48 preview
Page 49 preview
Page 50 preview
Page 51 preview
Page 52 preview
Page 53 preview
Page 54 preview
Page 55 preview
Page 56 preview
Page 57 preview
Page 58 preview
Page 59 preview
Page 60 preview
Page 61 preview
Page 62 preview
Page 63 preview
Page 64 preview
Page 65 preview
Page 66 preview
Page 67 preview
Page 68 preview
Page 69 preview
Page 70 preview
Page 71 preview
Page 72 preview
Page 73 preview
Page 74 preview
Page 75 preview
Page 76 preview
Page 77 preview
Page 78 preview
Page 79 preview
Page 80 preview
Page 81 preview
Page 82 preview
Page 83 preview
Page 84 preview
Page 85 preview
Page 86 preview
Page 87 preview
Page 88 preview
Page 89 preview
Page 90 preview
Page 91 preview
Page 92 preview
Page 93 preview
Page 94 preview
Page 95 preview
Page 96 preview
Page 97 preview
Page 98 preview
Page 99 preview
Page 100 preview
Page 101 preview
Page 102 preview
Page 103 preview
Page 104 preview
Page 105 preview
Page 106 preview
Page 107 preview
Page 108 preview
Page 109 preview
Page 110 preview
Page 111 preview
Page 112 preview
Page 113 preview
Page 114 preview
Page 115 preview
Page 116 preview
Page 117 preview
Page 118 preview
Page 119 preview
Page 120 preview
Page 121 preview
Page 122 preview
Page 123 preview
Page 124 preview
Page 125 preview
Page 126 preview
Page 127 preview
Page 128 preview
Page 129 preview
Page 130 preview
Page 131 preview
Page 132 preview
Page 133 preview
Page 134 preview
Page 135 preview
Page 136 preview
Page 137 preview
Page 138 preview
Page 139 preview
Page 140 preview
Page 141 preview
Page 142 preview
Page 143 preview
Page 144 preview
Page 145 preview
Page 146 preview
Page 147 preview
Page 148 preview
Page 149 preview
Page 150 preview
Page 151 preview
Page 152 preview
Contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About this Document
  8. M86 Technical Support Call Procedures
  9. Unpack the Unit from the Carton
  10. Select a Site for the Server
  11. Rack Mount the Server
  12. Rack Mount Instructions for 500 Series Servers
  13. Install the Slide Assemblies to the Rack
  14. Install the Chassis into the Rack
  15. Install the Bezel on the 500 Series Chassis
  16. Check the Power Supply
  17. General Safety Information
  18. AC Power Cord and Cable Precautions
  19. Motherboard Battery Precautions
  20. Step 1: Setup Procedures
  21. I NSTALL THE S ERVER
  22. Power on the WFR
  23. HyperTerminal Setup Procedures
  24. Login screen
  25. Quick Start menu: administration menu
  26. Change filtering mode
  27. Configure host name
  28. Non-Quick Start procedures or settings
  29. System Status screen
  30. Step 1B: LCD Panel Setup Procedures
  31. M86 menu
  32. Gateway
  33. Host Name
  34. LCD Options menu
  35. Step 2: Physically Connect the Unit to the Network
  36. Step 3: Register the WFR and its Applications
  37. Accept the Security Certificate in Firefox
  38. Temporarily Accept the Security Certificate in IE
  39. Accept the Security Certificate in Safari
  40. Accept the Security Certificate in Chrome
  41. Accept the End User License Agreement
  42. Log in to the Security Reporter Wizard
  43. Enter Main Administrator Criteria
  44. Secure Web Gateway Setup Criteria
  45. Step 4: Generate SSL Certificate
  46. IE Security Certificate Installation Procedures
  47. Map the WFR's IP Address to the Server's Host Name
  48. Step 5: Test Filtering on the Web Filter
  49. Step 6: Set Library Updates
  50. Log in to the Web Filter
  51. Perform a Complete Library Update
  52. Monitor the Library Update Process
  53. Step 7: Set Self-Monitoring
  54. Step 8: Verify Web Filter Log Transfer
  55. Add an SWG Device to the Device Registry
  56. SWG Log Transfer Setup
  57. Policy Settings
  58. SWG Configuration for Software Version 9.2.5
  59. Single Sign-On Access, Default Username/Password
  60. C ONCLUSION
  61. B EST F ILTERING AND R EPORTING P RACTICES
  62. Web Filter Usage Scenarios
  63. I. Threats/Liabilities
  64. D. Custom Lock, Block, Warn, X Strikes, Quota
  65. G. Custom Category (blocked)
  66. J. Exception URL bypass
  67. II. Bandwidth/Productivity
  68. D. Warn option with low filter settings
  69. G. IM patterns
  70. J. Remote Access patterns
  71. M. Rule block
  72. P. Custom Block/Warn/X Strikes/Quota
  73. III. General/Productivity
  74. C. Time Quota/Hit Quota
  75. F. Customize an M86 Supplied Category
  76. IV. Pass/Allow
  77. D. Override Accounts
  78. Report Manager Usage Scenarios
  79. Step B: Further investigate using a Summary Drill Down Report
  80. Step C: Create a new report using yesterday's date scope
  81. Step D: Create a double-break report with two sets of criteria
  82. Step E: Create a Detail Drill Down Report to obtain a list of URLs
  83. II. 'Group By' Report and Export Report exercise
  84. Step B: Modify the report view to only display top 10 site records
  85. Step C: Export the report view in the PDF output format
  86. III. Save and schedule a report exercise
  87. Step B. Schedule a recurring time for the report to run
  88. IV. Create a Custom Category Group and generate reports
  89. V. Create a custom User Group and generate reports
  90. Step B: Generate a report for a custom User Group
  91. Real Time Reports Usage Scenarios
  92. Step B: Navigate panels in the Policy section
  93. Step B: Investigate a user's activity in a specified gauge
  94. Step C: Investigate the user's Internet activity in other gauges
  95. III. Create a gauge exercise
  96. IV. Create an email alert exercise
  97. Step B: Select Email Alert Action
  98. Step C: Receiving an email alert
  99. Security Reports Usage Scenarios
  100. Step B: Navigate to the Security Policy Violations report
  101. Step D: Navigate to the Rule Transactions report
  102. II. Create a drill down Security Report view
  103. Exercise B: Create a detail report view
  104. III. Create a customized Security Report
  105. Exercise B: Use the Report Wizard to run a custom report
  106. IV. Export a Security Report
  107. Step C: Download the report
  108. V. Save a Security Report
  109. Step C: Select the users or group in Users
  110. VI. Schedule a Security Report to run
  111. Exercise B: Use the Wizard to create and schedule reports
  112. Access the Report Schedule panel
  113. Evaluation Mode Pop-Up
  114. Report Manager Server Information Panel
  115. Front Control Panel on 500 Series Unit
  116. Front Control Panel on a 300 Series Unit
  117. Declaration of the Manufacturer or Importer
  118. EC Declaration of Conformity
/ 152
Related manuals for M86 Security 350
M86 Security MSA Installation Manual first page preview
M86 Security MSA Installation Manual
M86 Security M86 Web Filter User Manual first page preview
M86 Security M86 Web Filter User Manual
M86 Security M86 IR Enterprise Reporter User Manual first page preview
M86 Security M86 IR Enterprise Reporter User Manual
This manual is suitable for:
350550