OneStart

M86 Security 350 manuals

350 first page preview

350

Brand: M86 Security | Category: Network Hardware
Table of contents
  1. installation guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About this Document
  8. M86 Security Corporate Headquarters (USA)
  9. Unpack the Unit from the Carton
  10. Select a Site for the Server
  11. Rack Mount the Server
  12. Rack Mount Instructions for 500 Series Servers
  13. Install the Slide Assemblies to the Rack
  14. Install the Chassis into the Rack
  15. Install the Bezel on the 500 Series Chassis
  16. Check the Power Supply
  17. General Safety Information
  18. AC Power Cord and Cable Precautions
  19. Motherboard Battery Precautions
  20. Step 1: Setup Procedures
  21. Step 1A: Quick Start Setup Procedures
  22. Power on the WFR
  23. HyperTerminal Setup Procedures
  24. Login screen
  25. Quick Start menu: administration menu
  26. Change filtering mode
  27. Configure host name
  28. Non-Quick Start procedures or settings
  29. System Status screen
  30. Step 1B: LCD Panel Setup Procedures
  31. M86 menu
  32. WF Filter Mode
  33. Host Name
  34. TAR GUI Wizard User
  35. Reboot
  36. LCD Options menu
  37. Step 2: Physically Connect the Unit to the Network
  38. Step 3: Register the WFR and its Applications
  39. Accept the Security Certificate in Firefox
  40. Temporarily Accept the Security Certificate in IE
  41. Accept the Security Certificate in Safari
  42. Accept the End User License Agreement
  43. Log in to the Threat Analysis Reporter Wizard
  44. Use the TAR Wizard to Specify Application Settings
  45. Setup Criteria for an Additional Web Filter
  46. Step 4: Generate SSL Certificate
  47. IE Security Certificate Installation Procedures
  48. windows 7 with ie
  49. Map the WFR's IP Address to the Server's Host Name
  50. Step 5: Test Filtering or the Mobile Client Connection
  51. Step 6: Set Library Updates
  52. Log in to the Web Filter
  53. Perform a Complete Library Update
  54. Monitor the Library Update Process
  55. Step 7: Set Self-Monitoring
  56. Step 8: Verify Web Filter Log Transfer
  57. Single Sign-On Access, Default Username/Password
  58. C ONCLUSION
  59. P RACTICES
  60. Web Filter Usage Scenarios
  61. I. Threats/Liabilities
  62. Custom Lock, Block, Warn, X Strikes, Quota pages
  63. Custom Category (blocked)
  64. Exception URL bypass
  65. II. Bandwidth/Productivity
  66. Warn option with low filter settings
  67. IM patterns
  68. Remote Access patterns
  69. Rule block
  70. Custom Block/Warn/X Strikes/Quota pages
  71. III. General/Productivity
  72. Time Quota/Hit Quota
  73. Customize an M86 Supplied Category
  74. IV. Pass/Allow
  75. Override Accounts
  76. Threat Analysis Reporter Usage Scenarios
  77. Step B: Navigate panels in the Policy section
  78. II. Drill down into a gauge exercise
  79. Step B: Investigate a user's activity in a specified gauge
  80. Step C: Investigate the user's Internet activity in other gauges
  81. III. Create a gauge exercise
  82. step b: add a url gauge
  83. IV. Create an email alert exercise
  84. Step C: Select Email Alert Action
  85. Step D: Receiving an email alert
  86. Enterprise Reporter Usage Scenarios
  87. Step B: Further investigate using a Summary Drill Down Report
  88. Step C: Create a New Report using yesterday's date scope
  89. Step E: Create a Detail Drill Down Report to obtain a list of URLs
  90. II. Double-break Report and Export Report exercise
  91. Step B: Modify the report view to only display top 10 site records
  92. Step C: Export the report view in the .PDF output format
  93. III. Save and schedule a report exercise
  94. Step B. Schedule a recurring time for the report to run
  95. IV. Create a custom category group and generate reports
  96. V. Create a custom user group and generate reports
  97. Detail Report
  98. Evaluation Mode Pop-Ups
  99. ER Web Client, ER Server Information Window
  100. Front Control Panel on 500 Series Unit
  101. Front Control Panel on a 300 Series Unit
  102. Declaration of the Manufacturer or Importer
  103. EC Declaration of Conformity
350 first page preview

350

Brand: M86 Security | Category: Firewall
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About this Document
  8. M86 Technical Support Call Procedures
  9. Unpack the Unit from the Carton
  10. Select a Site for the Server
  11. Rack Mount the Server
  12. Rack Mount Instructions for 500 Series Servers
  13. Install the Slide Assemblies to the Rack
  14. Install the Chassis into the Rack
  15. Install the Bezel on the 500 Series Chassis
  16. Check the Power Supply
  17. General Safety Information
  18. AC Power Cord and Cable Precautions
  19. Motherboard Battery Precautions
  20. Step 1: Setup Procedures
  21. I NSTALL THE S ERVER
  22. Power on the WFR
  23. HyperTerminal Setup Procedures
  24. Login screen
  25. Quick Start menu: administration menu
  26. Change filtering mode
  27. Configure host name
  28. Non-Quick Start procedures or settings
  29. System Status screen
  30. Step 1B: LCD Panel Setup Procedures
  31. M86 menu
  32. Gateway
  33. Host Name
  34. LCD Options menu
  35. Step 2: Physically Connect the Unit to the Network
  36. Step 3: Register the WFR and its Applications
  37. Accept the Security Certificate in Firefox
  38. Temporarily Accept the Security Certificate in IE
  39. Accept the Security Certificate in Safari
  40. Accept the Security Certificate in Chrome
  41. Accept the End User License Agreement
  42. Log in to the Security Reporter Wizard
  43. Enter Main Administrator Criteria
  44. Secure Web Gateway Setup Criteria
  45. Step 4: Generate SSL Certificate
  46. IE Security Certificate Installation Procedures
  47. Map the WFR's IP Address to the Server's Host Name
  48. Step 5: Test Filtering on the Web Filter
  49. Step 6: Set Library Updates
  50. Log in to the Web Filter
  51. Perform a Complete Library Update
  52. Monitor the Library Update Process
  53. Step 7: Set Self-Monitoring
  54. Step 8: Verify Web Filter Log Transfer
  55. Add an SWG Device to the Device Registry
  56. SWG Log Transfer Setup
  57. Policy Settings
  58. SWG Configuration for Software Version 9.2.5
  59. Single Sign-On Access, Default Username/Password
  60. C ONCLUSION
  61. B EST F ILTERING AND R EPORTING P RACTICES
  62. Web Filter Usage Scenarios
  63. I. Threats/Liabilities
  64. D. Custom Lock, Block, Warn, X Strikes, Quota
  65. G. Custom Category (blocked)
  66. J. Exception URL bypass
  67. II. Bandwidth/Productivity
  68. D. Warn option with low filter settings
  69. G. IM patterns
  70. J. Remote Access patterns
  71. M. Rule block
  72. P. Custom Block/Warn/X Strikes/Quota
  73. III. General/Productivity
  74. C. Time Quota/Hit Quota
  75. F. Customize an M86 Supplied Category
  76. IV. Pass/Allow
  77. D. Override Accounts
  78. Report Manager Usage Scenarios
  79. Step B: Further investigate using a Summary Drill Down Report
  80. Step C: Create a new report using yesterday's date scope
  81. Step D: Create a double-break report with two sets of criteria
  82. Step E: Create a Detail Drill Down Report to obtain a list of URLs
  83. II. 'Group By' Report and Export Report exercise
  84. Step B: Modify the report view to only display top 10 site records
  85. Step C: Export the report view in the PDF output format
  86. III. Save and schedule a report exercise
  87. Step B. Schedule a recurring time for the report to run
  88. IV. Create a Custom Category Group and generate reports
  89. V. Create a custom User Group and generate reports
  90. Step B: Generate a report for a custom User Group
  91. Real Time Reports Usage Scenarios
  92. Step B: Navigate panels in the Policy section
  93. Step B: Investigate a user's activity in a specified gauge
  94. Step C: Investigate the user's Internet activity in other gauges
  95. III. Create a gauge exercise
  96. IV. Create an email alert exercise
  97. Step B: Select Email Alert Action
  98. Step C: Receiving an email alert
  99. Security Reports Usage Scenarios
  100. Step B: Navigate to the Security Policy Violations report
  101. Step D: Navigate to the Rule Transactions report
  102. II. Create a drill down Security Report view
  103. Exercise B: Create a detail report view
  104. III. Create a customized Security Report
  105. Exercise B: Use the Report Wizard to run a custom report
  106. IV. Export a Security Report
  107. Step C: Download the report
  108. V. Save a Security Report
  109. Step C: Select the users or group in Users
  110. VI. Schedule a Security Report to run
  111. Exercise B: Use the Wizard to create and schedule reports
  112. Access the Report Schedule panel
  113. Evaluation Mode Pop-Up
  114. Report Manager Server Information Panel
  115. Front Control Panel on 500 Series Unit
  116. Front Control Panel on a 300 Series Unit
  117. Declaration of the Manufacturer or Importer
  118. EC Declaration of Conformity