OneStart

M86 Security 700 Evaluation Manual

Also see for 300: Installation guideInstallation guide

Page 1 preview
Page 2 preview
Page 3 preview
Page 4 preview
Page 5 preview
Page 6 preview
Page 7 preview
Page 8 preview
Page 9 preview
Page 10 preview
Page 11 preview
Page 12 preview
Page 13 preview
Page 14 preview
Page 15 preview
Page 16 preview
Page 17 preview
Page 18 preview
Page 19 preview
Page 20 preview
Page 21 preview
Page 22 preview
Page 23 preview
Page 24 preview
Page 25 preview
Page 26 preview
Page 27 preview
Page 28 preview
Page 29 preview
Page 30 preview
Page 31 preview
Page 32 preview
Page 33 preview
Page 34 preview
Page 35 preview
Page 36 preview
Page 37 preview
Page 38 preview
Page 39 preview
Page 40 preview
Page 41 preview
Page 42 preview
Page 43 preview
Page 44 preview
Page 45 preview
Page 46 preview
Page 47 preview
Page 48 preview
Page 49 preview
Page 50 preview
Page 51 preview
Page 52 preview
Page 53 preview
Page 54 preview
Page 55 preview
Page 56 preview
Page 57 preview
Page 58 preview
Page 59 preview
Page 60 preview
Page 61 preview
Page 62 preview
Page 63 preview
Page 64 preview
Page 65 preview
Page 66 preview
Page 67 preview
Page 68 preview
Page 69 preview
Page 70 preview
Page 71 preview
Page 72 preview
Page 73 preview
Page 74 preview
Page 75 preview
Page 76 preview
Page 77 preview
Page 78 preview
Page 79 preview
Page 80 preview
Page 81 preview
Page 82 preview
Page 83 preview
Page 84 preview
Page 85 preview
Page 86 preview
Contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Product Overview
  6. Install, Configure, and Test the Security Reporter
  7. Understand the most common and useful features
  8. Use Custom Category Groups to narrow your search
  9. Use custom User Groups to narrow your search
  10. Patterns frame
  11. IP Ranges frame
  12. Single Users/Exclude frame
  13. Use Security Reporter to conduct an investigation
  14. Use Summary Reports for a high level overview
  15. How to generate a Summary Report
  16. How to export a Summary Report
  17. Use Drill Down Reports for an investigation
  18. Summary Drill Down Report navigation
  19. Bandwidth and Time columns
  20. Column sorting tips
  21. How to generate a Detail Drill Down Report
  22. Detail Drill Down Report exercise
  23. Step D: Sort by "Content Type
  24. Create a custom report for a specific user
  25. Step B: Specify the Report Type
  26. Step D: Specify Other Report Components
  27. Step F: Save the Report
  28. Export Summary Drill Down Reports
  29. View and print options
  30. Sample report file formats
  31. Summary Drill Down Reporting tools
  32. Records fields
  33. Filter and Filter String fields
  34. For additional-break reports only
  35. E-Mail / For e-mail output only fields
  36. Commonly used reports
  37. Report format
  38. Examples of available Sample Reports
  39. Sample Report 3: "By Category/User/Site
  40. How to drill down into a URL gauge
  41. Threat Level
  42. Step C: View a list of Threats the end user accessed
  43. Step E: Further investigate a user's activity
  44. How to view URL Trend Reports
  45. Step B: View a line chart for a single URL gauge
  46. Monitor Bandwidth gauges
  47. How to drill down into a Bandwidth gauge
  48. Step C: View a user's port usage information
  49. How to view Bandwidth Trend Chart activity
  50. Step B: View a line chart for a single Bandwidth gauge
  51. How to view charts for a specific Bandwidth gauge
  52. Get the complete picture
  53. How to create a New Gauge
  54. Step C: Specify Gauge Information
  55. Step D: Select users to be monitored by the gauge
  56. Step E: Save gauge settings
  57. Step B: Specify Alert Information
  58. Step C: Specify criteria in the right side of the panel
  59. How to modify the current report view
  60. Create a customized security report
  61. Step B: Populate the Report Details frame
  62. Step C: Use accordions in the Users frame
  63. Step D: Run the report
  64. Capture the security report in PDF format
  65. Step C: Download or email the report
  66. Security Report format
  67. Save the security report you generated
  68. Step B: Specify criteria in the Report Details frame
  69. Step D: Populate the Email Settings frame
  70. Two methods for scheduling security reports
  71. Method 2: Create a report using the Wizard
  72. Step C: Include the users or group in the Users frame
  73. Step E: Set the schedule for running the report
  74. How to access and view the Report Schedule panel
  75. View Details for a Scheduled Report Run Event
/ 86
Related manuals for M86 Security 300
M86 Security HL Installation Manual first page preview
M86 Security HL Installation Manual
M86 Security Threat Analysis Reporter User Manual first page preview
M86 Security Threat Analysis Reporter User Manual
This manual is suitable for:
300500700705730735