Log:
valutazioni - 3, GPA: 3.3 ( )

Istruzioni per l'uso 3Com, Modello Threat Analysis Reporter TAR HL/SL/MSA

Produttore : 3Com
File Size : 915.44 kb
File Nome : 2c56bb90-ca9d-4824-905c-bd3daf30e076.pdf
Lingua di insegnamento: en
Vai a scaricare



Facilità d'uso


Step 1: Select Alerts In the left-hand menu tree, click “Policy” to explode the sub-options, and then click “Alerts”. This action will open a pop-up window (see Step 2). Select Alerts from left panel Step 2: Add a New Alert Click on the “Add New Alert” button to set parameters for the alert. Add a new alert 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 4: CREATE AN AUTOMATED ALERT STEP 3: SPECIFY ALERT COMPONENTS Step 3: Specify Alert Components Create a new alert by performing the following actions: 1. Click on one of the gauge names in the “Current Gauge” list (e.g. “Adult Content”). 2. Enable Alert Action checkboxes for “Email” and “Lockout”. 3. Type in the name for your alert in the “Alert Name” field. 4. Type in an email address and click the “Add Email” button. This is the address of the person who will be notified when an alert is triggered. You can add multiple email addresses. 5. Select a Severity level (Low, Medium or High). This section is only enabled when the “Lockout” checkbox is selected. A “Low” selection will lock out the user by the categories monitored in the specific gauge only. A “Medium” selection will lock out the user from Internet access altogether. A “High” selection will lock out the users from all network protocols, so they cannot access the Internet, send e-mails, use instant messaging, or use P2P or FTP. NOTES: Time-based lockouts can be set for a range of 30 minutes, one hour to eight hours, or unlimited. System Tray will not be shown in this demo, but if this feature is enabled, the administrator with an LDAP username, password and domain will see a system tray alert in the desktop system tray when an alert has been triggered. This applies to Active Directory environments only. For more information, please consult the Threat Analysis Reporter User Guide. 6. Create a Threshold per user. This numeric value is the number of times each user will be allowed to visit categories monitored by the gauge before triggering an alert. 7. Click on the “Submit” button to activate the alert. Specify alert criteria 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 5: VIEW A URL TREND REPORT STEP 1: ACCESS TREND CHARTS CHAPTER 5: VIEW A URL TREND REPORT TAR lets you generate historical trend reports that show activity by URL categories and bandwidth protocols for a specified time period. These trend reports are helpful for monitoring improvement of activity in a certain category as well as providing a good tool for setting appropriate thresholds for each TAR gauge. Step 1: Access Trend Charts Click the “Report/Analysis” menu and then the “Trend Chart” sub-menu. Select Trend Chart from left panel Step 2: Change the Time Span You can change the time span represented in the trend report by selecting one of five other options from the drop down menu. Choices range from the last hour to the last month of data. View URL Trend Charts 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 6: MONITOR BANDWIDTH GAUGES STEP 1: SELECT BANDWIDTH AND OUTBOUND CHAPTER 6: MONITOR BANDWIDTH GAUGES In addition to monitoring URL activity by user, TAR lets you view bandwidth activity by user, protocol and port for both inbound and outbound activity. This information can then be easily compared to the user’s URL activity, providing a complete picture of the user’s Web behavior. Step 1: Select Bandwidth and Outbound Select the “Bandwidth” menu option and the “Outbound” sub-menu option. Select Bandwith and Outbound Step 2: Select the FTP Protocol Gauge Double-click the “FTP” protocol gauge. NOTE: The “score” on bandwidth gauges is based on the number bytes of bandwidth consumed; not page hits, as with URL gauges. FTP gauge selected 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 6: MONITOR BANDWIDTH GAUGES STEP 3: SELECT PORT 21 CHILD GAUGE Step 3: Select Port 21 Child Gauge Double-click on “Port 21” child gauge. FTP Port 21 gauge Step 4: View the User Summary Select one of the IP addresses in the list and then click the “User Summary” button. View User Summary 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 6: MONITOR BANDWIDTH GAUGES STEP 5: VIEW PORT TRAFFIC Step 5: View Port Traffic Select the “FTP” protocol from the list and click the “Port View” button. The port traffic for this user will display for each of the ports assigned to FTP (e.g. Port 20 and 21). View bandwidth used by end user 8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE CHAPTER 7: VIEW A BANDWIDTH TREND REPORT STEP 1: SELECT BANDWIDTH AND TREND CHART CHAPTER 7: VIEW A BANDWIDTH TREND REPORT As stated in Chapter 5, TAR has historical trend reports to demonstrate activity by URL categories and bandwidth protocols over a period of time. Bandwidth trend reports are helpful for monitoring bandwidth consumption improvement over time, as well as providing a good tool for setting appropriate thresholds for each TAR bandwidth gauge. Step 1: Select Ban...

Questo manuale è adatto anche per i modelli :
Apparecchiature di rete - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Apparecchiature di rete - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)
Apparecchiature di rete - Threat Analysis Reporter TAR HL/SL/MSA (915.44 kb)

Scrivi la tua opinione del dispositivo



Il messaggio
Il tuo nome :
Inserire le due cifre :
capcha





categorie