8e6 Technologies ER 4.0 manual Enable Search String Reporting, Enable Block Request Count

Page 85

ADMINISTRATOR SECTION CHAPTER 2: CONFIGURING THE ER SERVER

Enable Search String Reporting

If Search String Reporting is enabled, detail drill down reports display the full search string content typed into a search engine text box for search sites such as Google, Yahoo!, MSN, AOL, Ask.com, YouTube.com, and MySpace.com.

1.Click the radio button corresponding to “ON” to let search string entries display in drill down reports.

2.Click Apply to apply your setting.

Enable Block Request Count

If Block Request Count is enabled, the Top 20 Users by Blocked Request canned report can be generated by the administrator.

1.Click the radio button corresponding to “ON” to make the Top 20 Users by Blocked Request canned report selec- tion available in an administrator’s Canned Reports menu.

2.Click Apply to apply your setting.

NOTE: Since Canned Reports are processed each night, any changes made to settings today will not effective until the following day.

Enable Wall Clock Time

If Wall Clock Time is enabled, Wall Clock Time Reports can be generated by the administrator. These reports use the Wall Clock Time algorithm to calculate the amount of time an end user spent accessing a given page or object—disre- garding the number of seconds from each hit and counting each unique minute of Web time as one minute. Using this algorithm, an end user could never have more than 24 hours of Web time within a given 24-hour period.

8E6 TECHNOLOGIES, ENTERPRISE REPORTER ADMINISTRATOR USER GUIDE

77

Image 85
Contents R3000IR Model ER GuidePage 8E6ENTERPRISEREPORTER Administrator User Guide Page Contents Server Menu Technical Support / Product Warranties Ppendices S Ection Enterprise Reporter Overview OperationsOrganization How to Use this User GuideFollowing icons are used throughout this user guide ConventionsTerminology Enterprise Reporter Overview HOW to USE this User Guide Enterprise Reporter Overview HOW to USE this User Guide Enterprise Reporter Overview HOW to USE this User Guide Introduction Components Components and EnvironmentHardware SoftwareWorkstation Requirements EnvironmentNetwork Requirements Preliminary Network Settings Accessing the ServerProcedures for Accessing the Server Log On Procedures for Logging On, Off the ServerLogging on the First Time Administrator console, main screen, first-time accessSpecify the Server’s function Add/Edit/Delete Administrators screen Set up an Administrator Login IDLogout screen Log OffAdministrator Section Accessing the Server Administrator Console Configuring the ER ServerNetwork menu, main screen Network MenuLive Mode Box Mode screenArchive Mode Change Box Mode Change the Box ModeAdd/Edit/Delete Administrators screen Add an Administrator View a List of AdministratorsEdit an Administrator’s Login ID Delete an Administrator Locked-out Accounts and IPs screen Locked-out Accounts and IPs screenUnlock Accounts, IP addresses View Locked Accounts, IP addressesAdministrator Section Configuring the ER Server Server menu, main screen Server MenuBackup and Recovery Procedures Backup screenAdministrator Section Configuring the ER Server Execute a Manual Backup Set up/Edit External Backup FTP PasswordPerform a Remote Backup Perform a Restoration to the ER Server Self Monitoring screen Self Monitoring screenView a List of Contact E-Mail Addresses Set up and Activate Self-MonitoringRemove Recipient from E-mail Notification List Deactivate Self-MonitoringServer Status screen Server Status screenView the Status of the Server 10 Secure Access screen Secure Access screen11 Port entries Activate a Port to Access the ServerTerminate All Port Connections Terminate a Port Connection12 Software Update screen Software Update screenUninstall the Most Recently Applied Software Update View Installed Software UpdatesView Available Software Updates Readme Install a Software UpdateApply Now 16 Patch Log window Server Action Selections Shut Down screenPerform a Server Action 18 Web Client Server Management screen Web Client Server Management screenEnable/Disable the Web Client Scheduler Enable/Disable Web Client Server AccessRestart the Web Client Server User Name Identification screen Database Menu20 User Name Identification screen with IP.ID activated Administrator Section Configuring the ER Server Configure the Server to Log User Activity Set up a Customized Label for Unidentified MachinesView the User Name Identification screen Deactivate User Name Identification 21 Username Display Setting screen Username Display Setting screenModify the Username Display Setting View the Current Username Display SettingAdministrator Section Configuring the ER Server Establish the Unit of Elapsed Time for Page Views View Elapsed Time screenElapsed Time Rules View the Current Page Types Definition screenAdd a Page Type Remove a Page Type24 Tools screen Tools screenView Database Status Logs View Diagnostic ReportsAdministrator Section Configuring the ER Server Administrator Section Configuring the ER Server 25 Expiration screen Expiration screenExpiration Screen Terminology Expiration Rules View Data Storage Statistics Administrator Section Configuring the ER Server Administrator Section Configuring the ER Server Change Data Storage Settings Administrator Section Configuring the ER Server 26 NAS Status screen NAS Status screenView NAS Status Information Optional Features screen27 Optional Features screen Enable Block Request Count Enable Search String ReportingEnable Wall Clock Time Enable Page and/or Object Count Enable, Configure Password Security Option Administrator Section Configuring the ER Server Import User Groups User Group Import screenAdministrator Section Configuring the ER Server Hours Technical SupportContact Information 8e6 Corporate Headquarters USA Office Locations and Phone Numbers8e6 Taiwan Support Procedures Product Warranties Standard WarrantyTechnical Support and Service Extended Technical Support and Service Extended Warranty optionalAdministrator Console Evaluation ModeAppendix a Appendices Section Appendix a Expiration screen Use the Server in the Evaluation ModeEvaluation Mode Change the Evaluation ModeFig. A-3 Activation Page pop-up box ActivationAppendices Section Appendix a Appendix B Disable Pop-up Blocking SoftwareYahoo! Toolbar Pop-up Blocker Add the Client to the White ListFig. B-2 Allow pop-ups from source Google Toolbar Pop-up Blocker Fig. B-3 # blocked icon enabledAdwareSafe Pop-up Blocker Disable Pop-up BlockingWindows XP SP2 Pop-up Blocker Set up Pop-up BlockingUse the Internet Options dialog box 100 Use the IE ToolbarFig. B-7 Pop-up Blocker Settings Access the Client Set up the Information BarUse the Information Bar 103 104 Index 106 Ldap 108 109 110

ER 4.0 specifications

8e6 Technologies ER 4.0 is a cutting-edge solution designed to enhance cybersecurity and internet usage management across organizations. With a strong focus on innovation and adaptability, this software suite empowers businesses to protect their networks while ensuring compliance with policies and regulations.

One of the main features of ER 4.0 is its advanced web filtering capability, which allows organizations to monitor and control internet access for employees. This is vital for reducing the risks associated with malware, phishing attacks, and inappropriate content. The platform offers customizable filtering policies tailored to specific organizational needs, enabling administrators to block access to certain websites or categories while permitting safe browsing experiences.

Another key feature is the granular reporting and analytics tool. ER 4.0 provides comprehensive reporting capabilities that deliver real-time insights into user activity, bandwidth consumption, and potential security threats. This detailed visibility allows IT teams to make informed decisions about resource allocation, policy adjustments, and the overall effectiveness of their cybersecurity measures.

The integration of artificial intelligence and machine learning technologies sets ER 4.0 apart from its competitors. These technologies enhance threat detection and response times by analyzing patterns and behaviors across the network. By employing AI and machine learning, ER 4.0 can identify emerging threats and unusual activities, significantly reducing the response time to potential breaches.

ER 4.0 is also designed with user experience in mind. The intuitive dashboard offers quick access to key metrics and controls, simplifying the management process for administrators. The user-friendly interface minimizes the learning curve and ensures that even non-technical users can effectively navigate the platform.

In addition to these features, ER 4.0 prioritizes compliance with regulatory standards. Ensuring adherence to laws such as GDPR and CCPA is paramount for organizations, and ER 4.0 includes features that facilitate compliance, enabling businesses to track user data and maintain privacy standards.

The scalability of ER 4.0 makes it suitable for a wide range of organizations, from small businesses to large enterprises. Whether an organization is expanding or needs to adjust its security posture in response to changing circumstances, ER 4.0 can adapt accordingly.

In summary, 8e6 Technologies ER 4.0 stands out as an innovative solution for cybersecurity and internet usage management. With features like advanced web filtering, robust reporting, AI-driven threat detection, user-friendly design, compliance facilitation, and excellent scalability, organizations can rely on ER 4.0 to safeguard their networks and optimize productivity.