Warnings – 8e6 Technologies 3 User Manual

Page 59

Advertising
background image

8

E

6 T

ECHNOLOGIES

, E

NTERPRISE

R

EPORTER

3.0 U

SER

S

G

UIDE

59

A

DMINISTRATOR

S

ECTION

: C

HAPTER

2 - C

ONFIGURING

THE

ER 3.0 S

ERVER

As the administrator of the Server, you have the option to
either enable or disable this feature for logging users’ activi-
ties by usernames, machine names, and/or IP addresses of
machines.

WARNINGS

The ER 3.0 will generate NetBIOS requests outside

the network if IP.ID is activated and if no segment settings
have been specified in the configuration of the Web access
logging device—causing it to log external traffic. To resolve
this issue, the Web access logging device should be
modified to log activity only within the network. If a firewall is
used, it should be set up to prevent logging NetBIOS
requests outside the network.

NOTE: Depending on the type of Web access logging
device you are using, there may not be a configuration
parameter for segment settings.

Be sure the time zone specified for the ER 3.0 is the

same for each Web access logging device the ER 3.0 uses.
Failure in executing this setup will cause inconsistencies
when users’ logging times are reported, especially if IP.ID is
activated. If multiple Web access logging devices are used,
be sure to identify the subnets assigned to each of these
devices, as users cannot be tracked solely by IP address.

If using IP.ID, note that user login times are established

for set periods of 15 minutes, and if more than one user logs
onto the same machine during that time period, the activity
on that machine will be identified with the first user who
logged onto that machine. For example, the first user logs
on a machine for three minutes and then logs off. The
second user logs on the same machine for 11 minutes and
then logs off. The first user logs back on that machine for 16
minutes. All 30 minutes are logged as the first user’s activity.

Advertising