Threat analysis reporter evaluation guide, Overview, Note to evaluators – 8e6 Technologies Threat Analysis Reporter TAR HL/SL/MSA User Manual

Page 5: Install, configure, and test tar, Hreat, Nalysis, Eporter, Valuation, Uide

Advertising
background image

T

HREAT

A

NALYSIS

R

EPORTER

E

VALUATION

G

UIDE

O

VERVIEW

8

E

6 T

ECHNOLOGIES

, T

HREAT

A

NALYSIS

R

EPORTER

E

VALUATION

G

UIDE

1

T

HREAT

A

NALYSIS

R

EPORTER

E

VALUATION

G

UIDE

Overview

The Threat Analysis Reporter helps administrators manage internal Web-based
threats by monitoring Internet usage information by user in real-time, and by
providing proactive remediation tools to enforce the organization’s Acceptable Use
Policy.

Note to Evaluators

Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appli-
ance. Your interest in our company and product is greatly appreciated.

This Evaluation Guide Is designed to provide product evaluators an efficient way to
install, configure and exercise the main product features of the TAR.

Install, Configure, and Test TAR

To install the TAR appliance, configure the server, and to test the unit to ensure that
reporting is operational, please refer to the step-by-step instructions in the Threat
Analysis Reporter Quick Start Guide provided inside the carton containing the
chassis.

Please note that prior to reviewing TAR, the R3000 Internet Filter must already be
installed; this appliance is required for sending logs to the Reporter. See the R3000
Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter.

Advertising