OneStart

M86 Security 735 manuals

735 first page preview

735

Brand: M86 Security | Category: Server
Table of contents
  1. installation guide
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About this Document
  8. Security Reporter Models 705 and 735
  9. Conventions Used in this Document
  10. M86 Technical Support Call Procedures
  11. Unpack the Unit from the Carton
  12. Select a Site for the Server
  13. Rack Mount the Server
  14. Rack Mount Instructions for 500 Model Servers
  15. Install the Slide Assemblies to the Rack
  16. Install the Chassis into the Rack
  17. Rack Mount Instructions for 700 and 730 Model Servers
  18. Install the Inner Rails
  19. Install the Server into the Rack
  20. Install the Server into a Telco Rack
  21. Install the Bezel on the 500, 700, and 730 Model Chassis
  22. Check the Power Supply
  23. AC Power Cord and Cable Precautions
  24. Motherboard Battery Precautions
  25. Step 1: Setup Procedures
  26. I NSTALL THE S ERVER
  27. Power on the SR.
  28. Power up a 500, 700, or 730 Model
  29. HyperTerminal Setup Procedures
  30. Login screen
  31. Quick Start setup
  32. Configure network interface LAN1
  33. Time Zone regional setting
  34. Non-Quick Start procedures or settings
  35. System Status screen
  36. Step 1B: LCD Panel Setup Procedures
  37. LCD Menu
  38. Gateway
  39. Host Name
  40. LCD Options menu
  41. Step 2: Physically Connect the Unit to the Network
  42. Step 3: Access the SR and its Applications Online
  43. Accept the Security Certificate in Firefox
  44. Temporarily Accept the Security Certificate in IE
  45. Accept the Security Certificate in Safari
  46. Accept the End User License Agreement
  47. Log in to the Security Reporter Wizard
  48. Enter Bandwidth Range
  49. Step 4: Generate SSL Certificate
  50. IE Security Certificate Installation Procedures
  51. Window 7 with IE
  52. Map the SR's IP Address to the Server's Host Name
  53. Step 5: Add Web Filter, SWG to Device Registry
  54. Add an SWG Device
  55. Step 6: Set up Web Filter, SWG Log Transfers
  56. Web Filter Log Transfer Verification
  57. Set Self-Monitoring
  58. SWG Setup
  59. Policy Settings
  60. SWG Configuration for Software Version 9.2.5
  61. Single Sign-On Access, Default Username/Password
  62. C ONCLUSION
  63. B EST R EPORTING P RACTICES
  64. Report Manager Usage Scenarios
  65. Step B: Further investigate using a Summary Drill Down Report
  66. Step C: Create a new report using yesterday's date scope
  67. Step D: Create a double-break report with two sets of criteria
  68. Step E: Create a Detail Drill Down Report to obtain a list of URLs
  69. II. Double-break Report and Export Report exercise
  70. Step B: Modify the report view to only display top 10 site records
  71. Step C: Export the report view in the PDF output format
  72. III. Save and schedule a report exercise
  73. Step B. Schedule a recurring time for the report to run
  74. IV. Create a Custom Category Group and generate reports
  75. Step B: Run a report for a specified Custom Category Group
  76. V. Create a custom User Group and generate reports
  77. Step B: Generate a report for a custom User Group
  78. I. Screen navigation exercise
  79. Step B: Navigate panels in the Policy section
  80. Step B: Investigate a user's activity in a specified gauge
  81. Step C: Investigate the user's Internet activity in other gauges
  82. III. Create a gauge exercise
  83. IV. Create an email alert exercise
  84. Step B: Select Email Alert Action
  85. Step C: Receiving an email alert
  86. I. Explore the four basic Security Reports types
  87. Step B: Navigate to the Security Policy Violations report
  88. Step D: Navigate to the Rule Transactions report
  89. II. Create a customized Security Report
  90. Exercise B: Use the Report Wizard to run a custom report
  91. III. Export a Security Report
  92. Step D: View the exported Security Report
  93. IV. Save a Security Report
  94. Step B: Specify criteria in the Report Details frame
  95. Step D: Populate the Email Settings frame
  96. Exercise B: Use the Wizard to create and schedule reports
  97. Access the Report Schedule panel
  98. Evaluation Mode Pop-Up
  99. Report Manager Server Information Panel
  100. Front Control Panels on 500, 700 and 730 Models
  101. Rear Panel on the 700 and 730 Model
  102. Declaration of the Manufacturer or Importer
  103. EC Declaration of Conformity
  104. Preliminary Setup Procedures
  105. Step
  106. Install the Unit
  107. Shut Down, Restart Procedures
  108. Physical Components
  109. LED Display
735 first page preview

735

Brand: M86 Security | Category: Security System
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Product Overview
  6. Install, Configure, and Test the Security Reporter
  7. Understand the most common and useful features
  8. Use Custom Category Groups to narrow your search
  9. Use custom User Groups to narrow your search
  10. Patterns frame
  11. IP Ranges frame
  12. Single Users/Exclude frame
  13. Use Security Reporter to conduct an investigation
  14. Use Summary Reports for a high level overview
  15. How to generate a Summary Report
  16. How to export a Summary Report
  17. Use Drill Down Reports for an investigation
  18. Summary Drill Down Report navigation
  19. Bandwidth and Time columns
  20. Column sorting tips
  21. How to generate a Detail Drill Down Report
  22. Detail Drill Down Report exercise
  23. Step D: Sort by "Content Type
  24. Create a custom report for a specific user
  25. Step B: Specify the Report Type
  26. Step D: Specify Other Report Components
  27. Step F: Save the Report
  28. Export Summary Drill Down Reports
  29. View and print options
  30. Sample report file formats
  31. Summary Drill Down Reporting tools
  32. Records fields
  33. Filter and Filter String fields
  34. For additional-break reports only
  35. E-Mail / For e-mail output only fields
  36. Commonly used reports
  37. Report format
  38. Examples of available Sample Reports
  39. Sample Report 3: "By Category/User/Site
  40. How to drill down into a URL gauge
  41. Threat Level
  42. Step C: View a list of Threats the end user accessed
  43. Step E: Further investigate a user's activity
  44. How to view URL Trend Reports
  45. Step B: View a line chart for a single URL gauge
  46. Monitor Bandwidth gauges
  47. How to drill down into a Bandwidth gauge
  48. Step C: View a user's port usage information
  49. How to view Bandwidth Trend Chart activity
  50. Step B: View a line chart for a single Bandwidth gauge
  51. How to view charts for a specific Bandwidth gauge
  52. Get the complete picture
  53. How to create a New Gauge
  54. Step C: Specify Gauge Information
  55. Step D: Select users to be monitored by the gauge
  56. Step E: Save gauge settings
  57. Step B: Specify Alert Information
  58. Step C: Specify criteria in the right side of the panel
  59. How to modify the current report view
  60. Create a customized security report
  61. Step B: Populate the Report Details frame
  62. Step C: Use accordions in the Users frame
  63. Step D: Run the report
  64. Capture the security report in PDF format
  65. Step C: Download or email the report
  66. Security Report format
  67. Save the security report you generated
  68. Step B: Specify criteria in the Report Details frame
  69. Step D: Populate the Email Settings frame
  70. Two methods for scheduling security reports
  71. Method 2: Create a report using the Wizard
  72. Step C: Include the users or group in the Users frame
  73. Step E: Set the schedule for running the report
  74. How to access and view the Report Schedule panel
  75. View Details for a Scheduled Report Run Event