8e6 Technologies ER 4.0 manual Elapsed Time Rules

Page 67

ADMINISTRATOR SECTION CHAPTER 2: CONFIGURING THE ER SERVER

Elapsed Time Rules

Each time a user on the network accesses a Web site, this activity is logged as one or more visit(s) to that site. The amount of time a user spends on that site and the number of times he/she accesses that site is tracked according to the following rules:

A user will be logged as having visited a Web site one time if the amount of time spent on any pages at that site is equivalent to the value entered at the Elapse Time field, or less than that value.

For example, if the value entered at the Elapse Time field is 10 seconds, and if the user is at a site between one to 10 seconds—on the same page or on any other page within the same site—the user’s activity will be tracked as one visit to that Web site.

Each time the user exceeds the value entered at the Elapse Time field, the user will be tracked as having visited the site an additional time.

For example, if the value entered at the Elapse Time field is 10 seconds and the user remains at a Web site for 12 seconds, two visits to that site will be logged for him/her.

Each session at a Web site is tracked as one or more visit(s), depending on the duration of the session. A session is defined as a user’s activity at a site that begins when the user accesses the site and ends when the user exits the site.

For example, if the value entered at the Elapse Time field is 10 seconds and the user spends five seconds on a Web site, then exits, then returns to the same site for another 15 seconds, the user will have two sessions or three visits to that site logged for him/her (5 seconds = 1 visit, 15 seconds = 2 visits, for a total of 3 visits).

8E6 TECHNOLOGIES, ENTERPRISE REPORTER ADMINISTRATOR USER GUIDE

59

Image 67
Contents R3000IR Model ER GuidePage 8E6ENTERPRISEREPORTER Administrator User Guide Page Contents Server Menu Technical Support / Product Warranties Ppendices S Ection Enterprise Reporter Overview OperationsOrganization How to Use this User GuideFollowing icons are used throughout this user guide ConventionsTerminology Enterprise Reporter Overview HOW to USE this User Guide Enterprise Reporter Overview HOW to USE this User Guide Enterprise Reporter Overview HOW to USE this User Guide Introduction Software Components and EnvironmentComponents HardwareWorkstation Requirements EnvironmentNetwork Requirements Preliminary Network Settings Accessing the ServerProcedures for Accessing the Server Log On Procedures for Logging On, Off the ServerLogging on the First Time Administrator console, main screen, first-time accessSpecify the Server’s function Add/Edit/Delete Administrators screen Set up an Administrator Login IDLogout screen Log OffAdministrator Section Accessing the Server Administrator Console Configuring the ER ServerNetwork menu, main screen Network MenuLive Mode Box Mode screenArchive Mode Change Box Mode Change the Box ModeAdd/Edit/Delete Administrators screen Add an Administrator View a List of AdministratorsEdit an Administrator’s Login ID Delete an Administrator Locked-out Accounts and IPs screen Locked-out Accounts and IPs screenUnlock Accounts, IP addresses View Locked Accounts, IP addressesAdministrator Section Configuring the ER Server Server menu, main screen Server MenuBackup and Recovery Procedures Backup screenAdministrator Section Configuring the ER Server Execute a Manual Backup Set up/Edit External Backup FTP PasswordPerform a Remote Backup Perform a Restoration to the ER Server Self Monitoring screen Self Monitoring screenDeactivate Self-Monitoring Set up and Activate Self-MonitoringView a List of Contact E-Mail Addresses Remove Recipient from E-mail Notification ListServer Status screen Server Status screenView the Status of the Server 10 Secure Access screen Secure Access screen11 Port entries Activate a Port to Access the ServerTerminate All Port Connections Terminate a Port Connection12 Software Update screen Software Update screenUninstall the Most Recently Applied Software Update View Installed Software UpdatesView Available Software Updates Readme Install a Software UpdateApply Now 16 Patch Log window Server Action Selections Shut Down screenPerform a Server Action 18 Web Client Server Management screen Web Client Server Management screenEnable/Disable the Web Client Scheduler Enable/Disable Web Client Server AccessRestart the Web Client Server User Name Identification screen Database Menu20 User Name Identification screen with IP.ID activated Administrator Section Configuring the ER Server Configure the Server to Log User Activity Set up a Customized Label for Unidentified MachinesView the User Name Identification screen Deactivate User Name Identification 21 Username Display Setting screen Username Display Setting screenModify the Username Display Setting View the Current Username Display SettingAdministrator Section Configuring the ER Server Establish the Unit of Elapsed Time for Page Views View Elapsed Time screenElapsed Time Rules View the Current Page Types Definition screenAdd a Page Type Remove a Page Type24 Tools screen Tools screenView Database Status Logs View Diagnostic ReportsAdministrator Section Configuring the ER Server Administrator Section Configuring the ER Server 25 Expiration screen Expiration screenExpiration Screen Terminology Expiration Rules View Data Storage Statistics Administrator Section Configuring the ER Server Administrator Section Configuring the ER Server Change Data Storage Settings Administrator Section Configuring the ER Server 26 NAS Status screen NAS Status screenView NAS Status Information Optional Features screen27 Optional Features screen Enable Block Request Count Enable Search String ReportingEnable Wall Clock Time Enable Page and/or Object Count Enable, Configure Password Security Option Administrator Section Configuring the ER Server Import User Groups User Group Import screenAdministrator Section Configuring the ER Server Hours Technical SupportContact Information 8e6 Corporate Headquarters USA Office Locations and Phone Numbers8e6 Taiwan Support Procedures Product Warranties Standard WarrantyTechnical Support and Service Extended Technical Support and Service Extended Warranty optionalAdministrator Console Evaluation ModeAppendix a Appendices Section Appendix a Expiration screen Use the Server in the Evaluation ModeEvaluation Mode Change the Evaluation ModeFig. A-3 Activation Page pop-up box ActivationAppendices Section Appendix a Add the Client to the White List Disable Pop-up Blocking SoftwareAppendix B Yahoo! Toolbar Pop-up BlockerFig. B-2 Allow pop-ups from source Google Toolbar Pop-up Blocker Fig. B-3 # blocked icon enabledAdwareSafe Pop-up Blocker Disable Pop-up BlockingWindows XP SP2 Pop-up Blocker Set up Pop-up BlockingUse the Internet Options dialog box 100 Use the IE ToolbarFig. B-7 Pop-up Blocker Settings Access the Client Set up the Information BarUse the Information Bar 103 104 Index 106 Ldap 108 109 110

ER 4.0 specifications

8e6 Technologies ER 4.0 is a cutting-edge solution designed to enhance cybersecurity and internet usage management across organizations. With a strong focus on innovation and adaptability, this software suite empowers businesses to protect their networks while ensuring compliance with policies and regulations.

One of the main features of ER 4.0 is its advanced web filtering capability, which allows organizations to monitor and control internet access for employees. This is vital for reducing the risks associated with malware, phishing attacks, and inappropriate content. The platform offers customizable filtering policies tailored to specific organizational needs, enabling administrators to block access to certain websites or categories while permitting safe browsing experiences.

Another key feature is the granular reporting and analytics tool. ER 4.0 provides comprehensive reporting capabilities that deliver real-time insights into user activity, bandwidth consumption, and potential security threats. This detailed visibility allows IT teams to make informed decisions about resource allocation, policy adjustments, and the overall effectiveness of their cybersecurity measures.

The integration of artificial intelligence and machine learning technologies sets ER 4.0 apart from its competitors. These technologies enhance threat detection and response times by analyzing patterns and behaviors across the network. By employing AI and machine learning, ER 4.0 can identify emerging threats and unusual activities, significantly reducing the response time to potential breaches.

ER 4.0 is also designed with user experience in mind. The intuitive dashboard offers quick access to key metrics and controls, simplifying the management process for administrators. The user-friendly interface minimizes the learning curve and ensures that even non-technical users can effectively navigate the platform.

In addition to these features, ER 4.0 prioritizes compliance with regulatory standards. Ensuring adherence to laws such as GDPR and CCPA is paramount for organizations, and ER 4.0 includes features that facilitate compliance, enabling businesses to track user data and maintain privacy standards.

The scalability of ER 4.0 makes it suitable for a wide range of organizations, from small businesses to large enterprises. Whether an organization is expanding or needs to adjust its security posture in response to changing circumstances, ER 4.0 can adapt accordingly.

In summary, 8e6 Technologies ER 4.0 stands out as an innovative solution for cybersecurity and internet usage management. With features like advanced web filtering, robust reporting, AI-driven threat detection, user-friendly design, compliance facilitation, and excellent scalability, organizations can rely on ER 4.0 to safeguard their networks and optimize productivity.