
| CONTENTS | 
 | 
| THREAT ANALYSIS REPORTER EVALUATION GUIDE | 1 | 
| Overview | 1 | 
| Note to Evaluators | 1 | 
| Install, Configure, and Test TAR | 1 | 
| CHAPTER 1: ACCESS THE TAR WEB CLIENT | 2 | 
| Step 1: Launch IE | 2 | 
| Step 2: Type in the URL | 2 | 
| Step 3: Log into the Application | 2 | 
| CHAPTER 2: DRILL DOWN INTO A URL GAUGE | 4 | 
| Step 1: How to Read a Gauge | 4 | 
| Gauge Name | 4 | 
| Score | 4 | 
| Time Span | 5 | 
| Threat Level | 5 | 
| Step 2: View Child Gauges | 5 | 
| Step 3: View a List of Users Affecting a Child Gauge | 6 | 
| Step 4: View an Individual User’s Gauge Activity | 6 | 
| Step 5: Take Action on an Individual’s Activity | 7 | 
| Step 6: View Category Details | 7 | 
| Step 7: View the Actual Web Page Visited by the User | 8 | 
| CHAPTER 3: CREATE A NEW URL GAUGE | 9 | 
| Step 1: Select the Gauges Menu Item | 9 | 
| Step 2: Add a Gauge Group | 9 | 
| Step 3: Define the Gauge | 10 | 
| Step 4: Advanced Settings | 11 | 
| CHAPTER 4: CREATE AN AUTOMATED ALERT | 12 | 
| Step 1: Select Alerts | 12 | 
| Step 2: Add a New Alert | 12 | 
| Step 3: Specify Alert Components | 13 | 
| 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE | iii |