M86 Security 705 manuals
705
Brand: M86 Security | Category: Server
Table of contents
- installation guide
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- About this Document
- Security Reporter Models 705 and 735
- Conventions Used in this Document
- M86 Technical Support Call Procedures
- Unpack the Unit from the Carton
- Select a Site for the Server
- Rack Mount the Server
- Rack Mount Instructions for 500 Model Servers
- Install the Slide Assemblies to the Rack
- Install the Chassis into the Rack
- Rack Mount Instructions for 700 and 730 Model Servers
- Install the Inner Rails
- Install the Server into the Rack
- Install the Server into a Telco Rack
- Install the Bezel on the 500, 700, and 730 Model Chassis
- Check the Power Supply
- AC Power Cord and Cable Precautions
- Motherboard Battery Precautions
- Step 1: Setup Procedures
- I NSTALL THE S ERVER
- Power on the SR.
- Power up a 500, 700, or 730 Model
- HyperTerminal Setup Procedures
- Login screen
- Quick Start setup
- Configure network interface LAN1
- Time Zone regional setting
- Non-Quick Start procedures or settings
- System Status screen
- Step 1B: LCD Panel Setup Procedures
- LCD Menu
- Gateway
- Host Name
- LCD Options menu
- Step 2: Physically Connect the Unit to the Network
- Step 3: Access the SR and its Applications Online
- Accept the Security Certificate in Firefox
- Temporarily Accept the Security Certificate in IE
- Accept the Security Certificate in Safari
- Accept the End User License Agreement
- Log in to the Security Reporter Wizard
- Enter Bandwidth Range
- Step 4: Generate SSL Certificate
- IE Security Certificate Installation Procedures
- Window 7 with IE
- Map the SR's IP Address to the Server's Host Name
- Step 5: Add Web Filter, SWG to Device Registry
- Add an SWG Device
- Step 6: Set up Web Filter, SWG Log Transfers
- Web Filter Log Transfer Verification
- Set Self-Monitoring
- SWG Setup
- Policy Settings
- SWG Configuration for Software Version 9.2.5
- Single Sign-On Access, Default Username/Password
- C ONCLUSION
- B EST R EPORTING P RACTICES
- Report Manager Usage Scenarios
- Step B: Further investigate using a Summary Drill Down Report
- Step C: Create a new report using yesterday's date scope
- Step D: Create a double-break report with two sets of criteria
- Step E: Create a Detail Drill Down Report to obtain a list of URLs
- II. Double-break Report and Export Report exercise
- Step B: Modify the report view to only display top 10 site records
- Step C: Export the report view in the PDF output format
- III. Save and schedule a report exercise
- Step B. Schedule a recurring time for the report to run
- IV. Create a Custom Category Group and generate reports
- Step B: Run a report for a specified Custom Category Group
- V. Create a custom User Group and generate reports
- Step B: Generate a report for a custom User Group
- I. Screen navigation exercise
- Step B: Navigate panels in the Policy section
- Step B: Investigate a user's activity in a specified gauge
- Step C: Investigate the user's Internet activity in other gauges
- III. Create a gauge exercise
- IV. Create an email alert exercise
- Step B: Select Email Alert Action
- Step C: Receiving an email alert
- I. Explore the four basic Security Reports types
- Step B: Navigate to the Security Policy Violations report
- Step D: Navigate to the Rule Transactions report
- II. Create a customized Security Report
- Exercise B: Use the Report Wizard to run a custom report
- III. Export a Security Report
- Step D: View the exported Security Report
- IV. Save a Security Report
- Step B: Specify criteria in the Report Details frame
- Step D: Populate the Email Settings frame
- Exercise B: Use the Wizard to create and schedule reports
- Access the Report Schedule panel
- Evaluation Mode Pop-Up
- Report Manager Server Information Panel
- Front Control Panels on 500, 700 and 730 Models
- Rear Panel on the 700 and 730 Model
- Declaration of the Manufacturer or Importer
- EC Declaration of Conformity
- Preliminary Setup Procedures
- Step
- Install the Unit
- Shut Down, Restart Procedures
- Physical Components
- LED Display
705
Brand: M86 Security | Category: Security System
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Product Overview
- Install, Configure, and Test the Security Reporter
- Understand the most common and useful features
- Use Custom Category Groups to narrow your search
- Use custom User Groups to narrow your search
- Patterns frame
- IP Ranges frame
- Single Users/Exclude frame
- Use Security Reporter to conduct an investigation
- Use Summary Reports for a high level overview
- How to generate a Summary Report
- How to export a Summary Report
- Use Drill Down Reports for an investigation
- Summary Drill Down Report navigation
- Bandwidth and Time columns
- Column sorting tips
- How to generate a Detail Drill Down Report
- Detail Drill Down Report exercise
- Step D: Sort by "Content Type
- Create a custom report for a specific user
- Step B: Specify the Report Type
- Step D: Specify Other Report Components
- Step F: Save the Report
- Export Summary Drill Down Reports
- View and print options
- Sample report file formats
- Summary Drill Down Reporting tools
- Records fields
- Filter and Filter String fields
- For additional-break reports only
- E-Mail / For e-mail output only fields
- Commonly used reports
- Report format
- Examples of available Sample Reports
- Sample Report 3: "By Category/User/Site
- How to drill down into a URL gauge
- Threat Level
- Step C: View a list of Threats the end user accessed
- Step E: Further investigate a user's activity
- How to view URL Trend Reports
- Step B: View a line chart for a single URL gauge
- Monitor Bandwidth gauges
- How to drill down into a Bandwidth gauge
- Step C: View a user's port usage information
- How to view Bandwidth Trend Chart activity
- Step B: View a line chart for a single Bandwidth gauge
- How to view charts for a specific Bandwidth gauge
- Get the complete picture
- How to create a New Gauge
- Step C: Specify Gauge Information
- Step D: Select users to be monitored by the gauge
- Step E: Save gauge settings
- Step B: Specify Alert Information
- Step C: Specify criteria in the right side of the panel
- How to modify the current report view
- Create a customized security report
- Step B: Populate the Report Details frame
- Step C: Use accordions in the Users frame
- Step D: Run the report
- Capture the security report in PDF format
- Step C: Download or email the report
- Security Report format
- Save the security report you generated
- Step B: Specify criteria in the Report Details frame
- Step D: Populate the Email Settings frame
- Two methods for scheduling security reports
- Method 2: Create a report using the Wizard
- Step C: Include the users or group in the Users frame
- Step E: Set the schedule for running the report
- How to access and view the Report Schedule panel
- View Details for a Scheduled Report Run Event