OneStart

M86 Security 500 manuals

500 first page preview

500

Brand: M86 Security | Category: Server
Table of contents
  1. installation guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. About this Document
  7. M86 Security Corporate Headquarters (USA)
  8. Unpack the Unit from the Carton
  9. Select a Site for the Server
  10. Rack Mount the Server
  11. Rack Mount Instructions for 500 Series Servers
  12. Install the Slide Assemblies to the Rack
  13. Install the Chassis into the Rack
  14. Rack Mount Instructions for 700 Series Servers
  15. Install the Inner Rails
  16. Install the Server into the Rack
  17. Install the Server into a Telco Rack
  18. Install the Bezel on the 500 and 700 Series Chassis
  19. Check the Power Supply
  20. AC Power Cord and Cable Precautions
  21. Motherboard Battery Precautions
  22. Step 1: Setup Procedures
  23. I NSTALL THE S ERVER
  24. Power on the Web Filter
  25. HyperTerminal Setup Procedures
  26. Login screen
  27. Quick Start menu: administration menu
  28. Change filtering mode
  29. Configure host name
  30. Non-Quick Start procedures or settings
  31. System Status screen
  32. Step 1B: LCD Panel Setup Procedures
  33. M86 menu
  34. WF Filter Mode
  35. Host Name
  36. LCD Options menu
  37. Step 2: Physically Connect the Unit to the Network
  38. Step 3: Access the Web Filter Online
  39. Accept the Security Certificate in Firefox
  40. Temporarily Accept the Security Certificate in IE
  41. Accept the Security Certificate in Safari
  42. Step 4: Log in, Generate SSL Certificate
  43. Generate SSL Certificate
  44. IE Security Certificate Installation Procedures
  45. Window 7 with IE
  46. Map the Web Filter's IP Address to the Server's Host Name
  47. Step 5: Test Filtering or the Mobile Client Connection
  48. Step 6: Set Library Updates
  49. Perform a Complete Library Update
  50. Monitor the Library Update Process
  51. C ONCLUSION
  52. Threat Class Groups
  53. I. Threats/Liabilities
  54. Custom Lock, Block, Warn, X Strikes, Quota
  55. Custom Category (blocked)
  56. Exception URL bypass
  57. II. Bandwidth/Productivity
  58. Warn option with low filter settings
  59. IM patterns
  60. Remote Access patterns
  61. Rule block
  62. Custom Block/Warn/X Strikes/Quota
  63. Warn-strike with higher thresholds
  64. Overall Quota
  65. IP exceptions
  66. Front Control Panels on 500 and 700 Series Units
  67. Rear Panel on the 700 Series Unit
  68. Declaration of the Manufacturer or Importer
  69. EC Declaration of Conformity
  70. Table Of Contents
  71. Table Of Contents
500 first page preview

500

Brand: M86 Security | Category: Server
Table of contents
  1. installation guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About this Document
  8. Security Reporter Models 705 and 735
  9. Conventions Used in this Document
  10. M86 Technical Support Call Procedures
  11. Unpack the Unit from the Carton
  12. Select a Site for the Server
  13. Rack Mount the Server
  14. Rack Mount Instructions for 500 Model Servers
  15. Install the Slide Assemblies to the Rack
  16. Install the Chassis into the Rack
  17. Rack Mount Instructions for 700 and 730 Model Servers
  18. Install the Inner Rails
  19. Install the Server into the Rack
  20. Install the Server into a Telco Rack
  21. Install the Bezel on the 500, 700, and 730 Model Chassis
  22. Check the Power Supply
  23. AC Power Cord and Cable Precautions
  24. Motherboard Battery Precautions
  25. Step 1: Setup Procedures
  26. I NSTALL THE S ERVER
  27. Power on the SR.
  28. Power up a 500, 700, or 730 Model
  29. HyperTerminal Setup Procedures
  30. Login screen
  31. Quick Start setup
  32. Configure network interface LAN1
  33. Time Zone regional setting
  34. Non-Quick Start procedures or settings
  35. System Status screen
  36. Step 1B: LCD Panel Setup Procedures
  37. LCD Menu
  38. Gateway
  39. Host Name
  40. LCD Options menu
  41. Step 2: Physically Connect the Unit to the Network
  42. Step 3: Access the SR and its Applications Online
  43. Accept the Security Certificate in Firefox
  44. Temporarily Accept the Security Certificate in IE
  45. Accept the Security Certificate in Safari
  46. Accept the End User License Agreement
  47. Log in to the Security Reporter Wizard
  48. Enter Bandwidth Range
  49. Step 4: Generate SSL Certificate
  50. IE Security Certificate Installation Procedures
  51. Window 7 with IE
  52. Map the SR's IP Address to the Server's Host Name
  53. Step 5: Add Web Filter, SWG to Device Registry
  54. Add an SWG Device
  55. Step 6: Set up Web Filter, SWG Log Transfers
  56. Web Filter Log Transfer Verification
  57. Set Self-Monitoring
  58. SWG Setup
  59. Policy Settings
  60. SWG Configuration for Software Version 9.2.5
  61. Single Sign-On Access, Default Username/Password
  62. C ONCLUSION
  63. B EST R EPORTING P RACTICES
  64. Report Manager Usage Scenarios
  65. Step B: Further investigate using a Summary Drill Down Report
  66. Step C: Create a new report using yesterday's date scope
  67. Step D: Create a double-break report with two sets of criteria
  68. Step E: Create a Detail Drill Down Report to obtain a list of URLs
  69. II. Double-break Report and Export Report exercise
  70. Step B: Modify the report view to only display top 10 site records
  71. Step C: Export the report view in the PDF output format
  72. III. Save and schedule a report exercise
  73. Step B. Schedule a recurring time for the report to run
  74. IV. Create a Custom Category Group and generate reports
  75. Step B: Run a report for a specified Custom Category Group
  76. V. Create a custom User Group and generate reports
  77. Step B: Generate a report for a custom User Group
  78. I. Screen navigation exercise
  79. Step B: Navigate panels in the Policy section
  80. Step B: Investigate a user's activity in a specified gauge
  81. Step C: Investigate the user's Internet activity in other gauges
  82. III. Create a gauge exercise
  83. IV. Create an email alert exercise
  84. Step B: Select Email Alert Action
  85. Step C: Receiving an email alert
  86. I. Explore the four basic Security Reports types
  87. Step B: Navigate to the Security Policy Violations report
  88. Step D: Navigate to the Rule Transactions report
  89. II. Create a customized Security Report
  90. Exercise B: Use the Report Wizard to run a custom report
  91. III. Export a Security Report
  92. Step D: View the exported Security Report
  93. IV. Save a Security Report
  94. Step B: Specify criteria in the Report Details frame
  95. Step D: Populate the Email Settings frame
  96. Exercise B: Use the Wizard to create and schedule reports
  97. Access the Report Schedule panel
  98. Evaluation Mode Pop-Up
  99. Report Manager Server Information Panel
  100. Front Control Panels on 500, 700 and 730 Models
  101. Rear Panel on the 700 and 730 Model
  102. Declaration of the Manufacturer or Importer
  103. EC Declaration of Conformity
  104. Preliminary Setup Procedures
  105. Step
  106. Install the Unit
  107. Shut Down, Restart Procedures
  108. Physical Components
  109. LED Display
500 first page preview

500

Brand: M86 Security | Category: Security System
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Product Overview
  6. Install, Configure, and Test the Security Reporter
  7. Understand the most common and useful features
  8. Use Custom Category Groups to narrow your search
  9. Use custom User Groups to narrow your search
  10. Patterns frame
  11. IP Ranges frame
  12. Single Users/Exclude frame
  13. Use Security Reporter to conduct an investigation
  14. Use Summary Reports for a high level overview
  15. How to generate a Summary Report
  16. How to export a Summary Report
  17. Use Drill Down Reports for an investigation
  18. Summary Drill Down Report navigation
  19. Bandwidth and Time columns
  20. Column sorting tips
  21. How to generate a Detail Drill Down Report
  22. Detail Drill Down Report exercise
  23. Step D: Sort by "Content Type
  24. Create a custom report for a specific user
  25. Step B: Specify the Report Type
  26. Step D: Specify Other Report Components
  27. Step F: Save the Report
  28. Export Summary Drill Down Reports
  29. View and print options
  30. Sample report file formats
  31. Summary Drill Down Reporting tools
  32. Records fields
  33. Filter and Filter String fields
  34. For additional-break reports only
  35. E-Mail / For e-mail output only fields
  36. Commonly used reports
  37. Report format
  38. Examples of available Sample Reports
  39. Sample Report 3: "By Category/User/Site
  40. How to drill down into a URL gauge
  41. Threat Level
  42. Step C: View a list of Threats the end user accessed
  43. Step E: Further investigate a user's activity
  44. How to view URL Trend Reports
  45. Step B: View a line chart for a single URL gauge
  46. Monitor Bandwidth gauges
  47. How to drill down into a Bandwidth gauge
  48. Step C: View a user's port usage information
  49. How to view Bandwidth Trend Chart activity
  50. Step B: View a line chart for a single Bandwidth gauge
  51. How to view charts for a specific Bandwidth gauge
  52. Get the complete picture
  53. How to create a New Gauge
  54. Step C: Specify Gauge Information
  55. Step D: Select users to be monitored by the gauge
  56. Step E: Save gauge settings
  57. Step B: Specify Alert Information
  58. Step C: Specify criteria in the right side of the panel
  59. How to modify the current report view
  60. Create a customized security report
  61. Step B: Populate the Report Details frame
  62. Step C: Use accordions in the Users frame
  63. Step D: Run the report
  64. Capture the security report in PDF format
  65. Step C: Download or email the report
  66. Security Report format
  67. Save the security report you generated
  68. Step B: Specify criteria in the Report Details frame
  69. Step D: Populate the Email Settings frame
  70. Two methods for scheduling security reports
  71. Method 2: Create a report using the Wizard
  72. Step C: Include the users or group in the Users frame
  73. Step E: Set the schedule for running the report
  74. How to access and view the Report Schedule panel
  75. View Details for a Scheduled Report Run Event