THREAT ANALYSIS REPORTER EVALUATION GUIDE OVERVIEW

THREAT ANALYSIS REPORTER EVALUATION GUIDE

Overview

The Threat Analysis Reporter helps administrators manage internal Web-based threats by monitoring Internet usage information by user in real-time, and by providing proactive remediation tools to enforce the organization’s Acceptable Use Policy.

Note to Evaluators

Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appli- ance. Your interest in our company and product is greatly appreciated.

This Evaluation Guide Is designed to provide product evaluators an efficient way to install, configure and exercise the main product features of the TAR.

Install, Configure, and Test TAR

To install the TAR appliance, configure the server, and to test the unit to ensure that reporting is operational, please refer to the step-by-step instructions in the Threat Analysis Reporter Quick Start Guide provided inside the carton containing the chassis.

Please note that prior to reviewing TAR, the R3000 Internet Filter must already be installed; this appliance is required for sending logs to the Reporter. See the R3000 Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter.

8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE

1

Page 5
Image 5
8e6 Technologies TAR HL/SL/MSA manual Overview, Install, Configure, and Test TAR, Threat Analysis Reporter Evaluation Guide