8e6 Technologies TAR HL/SL/MSA Network Card User Manual


 
THREAT ANALYSIS REPORTER EVALUATION GUIDE OVERVIEW
8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER EVALUATION GUIDE 1
THREAT ANALYSIS REPORTER EVALUATION GUIDE
Overview
The Threat Analysis Reporter helps administrators manage internal Web-based
threats by monitoring Internet usage information by user in real-time, and by
providing proactive remediation tools to enforce the organization’s Acceptable Use
Policy.
Note to Evaluators
Thank you for taking the time to review 8e6’s Threat Analysis Reporter (TAR) appli-
ance. Your interest in our company and product is greatly appreciated.
This Evaluation Guide Is designed to provide product evaluators an efficient way to
install, configure and exercise the main product features of the TAR.
Install, Configure, and Test TAR
To install the TAR appliance, configure the server, and to test the unit to ensure that
reporting is operational, please refer to the step-by-step instructions in the Threat
Analysis Reporter Quick Start Guide provided inside the carton containing the
chassis.
Please note that prior to reviewing TAR, the R3000 Internet Filter must already be
installed; this appliance is required for sending logs to the Reporter. See the R3000
Internet Filter Evaluation Guide for instructions on how to set up the Internet Filter.