8e6 Technologies Threat Analysis Reporter TAR HL-SL-MSA User Manual
Size:
1.21 Mb
Download

® Threat Analysis Reporter

EVALUATION

GUIDE

Models: TAR HL/SL/MSA

Software Version: 1.3.00

Document Version: 01.05.09

THREATANALYSISREPORTEREVALUATIONGUIDE

© 2009 8e6 Technologies

All rights reserved. Printed in the United States of America

Local: 714.282.6111 • Domestic U.S.: 1.888.786.7999 • International: +1.714.282.6111

This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written consent from 8e6 Technologies.

Every effort has been made to ensure the accuracy of this document. However, 8e6 Technologies makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. 8e6 Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. Due to future enhancements and modifications of this product, the information described in this documentation is subject to change without notice.

Trademarks

Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers.

ii

8E6 TECHNOLOGIES, THREATANALYSISREPORTEREVALUATIONGUIDE

CONTENTS

 

THREAT ANALYSIS REPORTER EVALUATION GUIDE ..........................................

1

Overview. .........................................................................................................................

1

Note to Evaluators. .........................................................................................................

1

Install, Configure, and Test TAR....................................................................................

1

CHAPTER 1: ACCESS THE TAR WEB CLIENT ...................................................

2

Step 1: Launch IE............................................................................................................

2

Step 2: Type in the URL..................................................................................................

2

Step 3: Log into the Application....................................................................................

2

CHAPTER 2: DRILL DOWN INTO A URL GAUGE ...............................................

4

Step 1: How to Read a Gauge. .......................................................................................

4

Gauge Name ............................................................................................................................

4

Score ........................................................................................................................................

4

Time Span ................................................................................................................................

5

Threat Level .............................................................................................................................

5

Step 2: View Child Gauges.............................................................................................

5

Step 3: View a List of Users Affecting a Child Gauge. ................................................

6

Step 4: View an Individual User’s Gauge Activity........................................................

6

Step 5: Take Action on an Individual’s Activity. ..........................................................

7

Step 6: View Category Details........................................................................................

7

Step 7: View the Actual Web Page Visited by the User...............................................

8

CHAPTER 3: CREATE A NEW URL GAUGE ......................................................

9

Step 1: Select the Gauges Menu Item. ..........................................................................

9

Step 2: Add a Gauge Group. ..........................................................................................

9

Step 3: Define the Gauge..............................................................................................

10

Step 4: Advanced Settings...........................................................................................

11

CHAPTER 4: CREATE AN AUTOMATED ALERT ................................................

12

Step 1: Select Alerts. ....................................................................................................

12

Step 2: Add a New Alert................................................................................................

12

Step 3: Specify Alert Components. .............................................................................

13

8E6 TECHNOLOGIES, THREATANALYSISREPORTEREVALUATIONGUIDE

iii

CONTENTS

CHAPTER 5: VIEW A URL TREND REPORT ....................................................

14

Step 1: Access Trend Charts. ......................................................................................

14

Step 2: Change the Time Span. ...................................................................................

14

CHAPTER 6: MONITOR BANDWIDTH GAUGES .................................................

15

Step 1: Select Bandwidth and Outbound....................................................................

15

Step 2: Select the FTP Protocol Gauge.......................................................................

15

Step 3: Select Port 21 Child Gauge. ............................................................................

16

Step 4: View the User Summary. .................................................................................

16

Step 5: View Port Traffic...............................................................................................

17

CHAPTER 7: VIEW A BANDWIDTH TREND REPORT .........................................

18

Step 1: Select Bandwidth and Trend Chart. ...............................................................

18

Step 2: View Bandwidth Trend Chart Data. ................................................................

18

iv

8E6 TECHNOLOGIES, THREATANALYSISREPORTEREVALUATIONGUIDE