This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written consent from 8e6 Technologies.
Every effort has been made to ensure the accuracy of this document. However, 8e6
Technologies makes no warranties with respect to this documentation and disclaims
any implied warranties of merchantability and fitness for a particular purpose. 8e6
Technologies shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the
examples herein. Due to future enhancements and modifications of this product, the
information described in this documentation is subject to change without notice.
Trademarks
Other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers.
The Threat Analysis Reporter helps administrators manage internal Web-based
threats by monitoring Internet usage information by user in real-time, and by
providing proactive remediation tools to enforce the organization’s Acceptable Use
Policy.
Note to Evaluators
Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appliance. Your interest in our company and product is greatly appreciated.
This Evaluation Guide Is designed to provide product evaluators an efficient way to
install, configure and exercise the main product features of the TAR.
Install, Configure, and Test TAR
To install the TAR appliance, configure the server, and to test the unit to ensure that
reporting is operational, please refer to the step-by-step instructions in the Threat
Analysis Reporter Quick Start Guide provided inside the carton containing the
chassis.
Please note that prior to reviewing TAR, the R3000 Internet Filter must already be
installed; this appliance is required for sending logs to the Reporter. See the R3000
Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter.
CHAPTER 1: ACCESSTHE TAR WEB CLIENTSTEP 1: LAUNCH IE
CHAPTER 1: ACCESSTHE TAR WEB CLIENT
Step 1: Launch IE
From your workstation, launch Internet Explorer to open an IE browser window.
NOTE: If pop-up blocking software is installed on the workstation, it must be disabled.
Information about disabling pop-up blocking software can be found in the TAR User Guide
Appendix A: Disable Pop-up Blocking Software.
Step 2: Type in the URL
In the Address field of the browser window, type in the URL for the TAR server:
http://x.x.x.x:8080 (in which ‘x.x.x.x’ represents the IP address). This action
opens the TAR login window, which serves as a portal for administrators to log into
TAR.
Login window
Step 3: Log into the Application
1. In the Username field, type in your username. If you are logging in as the global
administrator, enter the username registered during the quick start wizard
procedures.
If you are logging in as a group administrator, enter the username set up for you
by the global administrator.
2. In the Password field, type in your password. If you are logging in as the global
administrator, enter the password registered during the quick start wizard
procedures. If you are logging in as a group administrator, enter the password
set up for you by the global administrator. Asterisks display for each character
entered.
3. Click the Log In button to open the application that displays the URL dashboard
gauge view in the right panel by default. The navigation panel displays to the
left, and in the panel above the system time and date display (in the HH:MM:SS/
MM.DD.YYYY format) beside the Logout button: