CONFIGURE, TEST THE ENTERPRISE REPORTER USE ENTERPRISE REPORTER DRILL DOWN REPORTS
Click the URL link to launch the actual Web site viewed by the user to verify the content that was accessed.
Step 4: Sort by “Content Type”
Sort by the column labeled “Content Type” by clicking that column header. This will sort all records by the search type filtered on the R3000 Internet Filter. For example, “URL” indicates a page request was blocked or allowed based on the status of that URL in the 8e6 category library and “Search KW” indicates a user typed in a prohibited word into a search engine text box. One of 8e6 Technologies’ differentiators is “Proxy Pattern Blocking,” which will show up in the “Content Type” section if an Internet proxy site was blocked by 8e6’s proprietary proxy signature detection.
After reviewing a suspected policy violator’s Internet activity in the Detail Drill Down Report, the administrator will have firm evidence on the user’s intent, which is critical forensic information to have in the event the investigation moves to the disciplinary phase.
Step 5: Sort by “Search String”
Sort by the column labeled “Search String” by clicking that column header. This will sort all records alphabetically for results that include search string information. Search string content includes the actual text typed into a search engine text box on popular search engine sites such as Google, Yahoo, Ask.com and MSN. For example, if the end user typed in “recipes for chicken breast” in a search engine request, that entire string will appear in this column, not simply the blocked keywords within the request. This depth of detail helps clarify the intent of the end user, which helps tremendously in investigations.
Search String column
In the next section, this guide will go through the final step in a typical investiga-
8E6 TECHNOLOGIES, ENTERPRISE REPORTER EVALUATION GUIDE | 21 |