8e6 Technologies HL-SL-MSA User Manual

® Threat Analysis Reporter
EVALUATION
GUIDE
Models: TAR HL/SL/MSA
Software Version: 1.3.00
Document Version: 01.05.09
THREAT ANALYSIS REPORTER EVALUATION GUIDE
All rights reserved. Printed in the United States of America
Local: 714.282.6111 • Domestic U.S.: 1.888.786.7999 • International: +1.714.282.6111
This document may not, in whole or in part, be copied, photocopied, reproduced, trans­lated, or reduced to any electronic medium or machine readable form without prior writ­ten consent from 8e6 Technologies.
Every effort has been made to ensure the accuracy of this document. However, 8e6 Technologies makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. 8e6 Technologies shall not be liable for any error or for incidental or consequential dam­ages in connection with the furnishing, performance, or use of this manual or the examples herein. Due to future enhancements and modifications of this product, the information described in this documentation is subject to change without notice.
Trademarks
Other product names mentioned in this manual may be trademarks or registered trade­marks of their respective companies and are the sole property of their respective man­ufacturers.
ii 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE

CONTENTS

T
HREAT ANALYSIS REPORTER EVALUATION GUIDE
Overview. ......................................................................................................................... 1
Note to Evaluators. ......................................................................................................... 1
Install, Configure, and Test TAR.................................................................................... 1
C
HAPTER
Step 1: Launch IE............................................................................................................ 2
Step 2: Type in the URL.................................................................................................. 2
Step 3: Log into the Application.................................................................................... 2
C
HAPTER
Step 1: How to Read a Gauge. ....................................................................................... 4
1: A
CCESS THE
2: D
RILL DOWN INTO A
Gauge Name ............................................................................................................................ 4
Score ........................................................................................................................................4
Time Span ................................................................................................................................ 5
Threat Level .............................................................................................................................5
TAR WEB C
URL G
LIENT
..........................................1
...................................................2
AUGE
...............................................4
Step 2: View Child Gauges............................................................................................. 5
Step 3: View a List of Users Affecting a Child Gauge. ................................................ 6
Step 4: View an Individual User’s Gauge Activity........................................................ 6
Step 5: Take Action on an Individual’s Activity. .......................................................... 7
Step 6: View Category Details........................................................................................ 7
Step 7: View the Actual Web Page Visited by the User............................................... 8
C
HAPTER
Step 1: Select the Gauges Menu Item. .......................................................................... 9
Step 2: Add a Gauge Group. .......................................................................................... 9
Step 3: Define the Gauge.............................................................................................. 10
Step 4: Advanced Settings........................................................................................... 11
C
HAPTER
Step 1: Select Alerts. .................................................................................................... 12
3: C
REATE A NEW
4: C
REATE AN AUTOMATED ALERT
URL G
AUGE
......................................................9
................................................12
Step 2: Add a New Alert................................................................................................ 12
Step 3: Specify Alert Components. ............................................................................. 13
8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE iii
CONTENTS
C
HAPTER
Step 1: Access Trend Charts. ...................................................................................... 14
Step 2: Change the Time Span. ................................................................................... 14
C
HAPTER
Step 1: Select Bandwidth and Outbound.................................................................... 15
Step 2: Select the FTP Protocol Gauge....................................................................... 15
Step 3: Select Port 21 Child Gauge. ............................................................................ 16
Step 4: View the User Summary. ................................................................................. 16
Step 5: View Port Traffic............................................................................................... 17
C
HAPTER
Step 1: Select Bandwidth and Trend Chart. ............................................................... 18
5: V
IEW A
6: M
7: V
IEW A BANDWIDTH TREND REPORT
URL T
ONITOR BANDWIDTH GAUGES
REND REPORT
....................................................14
.................................................15
.........................................18
Step 2: View Bandwidth Trend Chart Data. ................................................................ 18
iv 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE
THREAT ANALYSIS REPORTER EVALUATION GUIDE OVERVIEW

THREAT ANALYSIS REPORTER EVALUATION GUIDE

Overview

The Threat Analysis Reporter helps administrators manage internal Web-based threats by monitoring Internet usage information by user in real-time, and by providing proactive remediation tools to enforce the organization’s Acceptable Use Policy.

Note to Evaluators

Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appli­ance. Your interest in our company and product is greatly appreciated.
This Evaluation Guide Is designed to provide product evaluators an efficient way to install, configure and exercise the main product features of the TAR.

Install, Configure, and Test TAR

To install the TAR appliance, configure the server, and to test the unit to ensure that reporting is operational, please refer to the step-by-step instructions in the Threat Analysis Reporter Quick Start Guide provided inside the carton containing the chassis.
Please note that prior to reviewing TAR, the R3000 Internet Filter must already be installed; this appliance is required for sending logs to the Reporter. See the R3000 Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter.
8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE 1
CHAPTER 1: ACCESS THE TAR WEB CLIENT STEP 1: LAUNCH IE

CHAPTER 1: ACCESS THE TAR WEB CLIENT

Step 1: Launch IE

From your workstation, launch Internet Explorer to open an IE browser window.
NOTE: If pop-up blocking software is installed on the workstation, it must be disabled. Information about disabling pop-up blocking software can be found in the TAR User Guide Appendix A: Disable Pop-up Blocking Software.

Step 2: Type in the URL

In the Address field of the browser window, type in the URL for the TAR server: http://x.x.x.x:8080 (in which ‘x.x.x.x’ represents the IP address). This action opens the TAR login window, which serves as a portal for administrators to log into TAR.
Login window

Step 3: Log into the Application

1. In the Username field, type in your username. If you are logging in as the global administrator, enter the username registered during the quick start wizard procedures.
If you are logging in as a group administrator, enter the username set up for you by the global administrator.
2. In the Password field, type in your password. If you are logging in as the global administrator, enter the password registered during the quick start wizard procedures. If you are logging in as a group administrator, enter the password set up for you by the global administrator. Asterisks display for each character entered.
3. Click the Log In button to open the application that displays the URL dashboard gauge view in the right panel by default. The navigation panel displays to the left, and in the panel above the system time and date display (in the HH:MM:SS/ MM.DD.YYYY format) beside the Logout button:
2 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE
CHAPTER 1: ACCESS THE TAR WEB CLIENT STEP 3: LOG INTO THE APPLICATION
URL dashboard with URL gauges
8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE 3
Loading...
+ 15 hidden pages