M86 Security M86 IR Enterprise Reporter User manual

M86 IR Enterprise Reporter
USER GUIDE
Administrator Console
Software Version: 6.0.10
Document Version: 06.15.10

II M86 SECURITY USER GUIDE
M86 IR ENTERPRISE REPORTER
ADMINISTRATOR USER GUIDE
© 2010 M86 Security
All rights reserved.
828 W. Taft Ave., Orange, CA 92865, USA
Version 1.01, published June 2010 for software release 6.0.10
Printed in the United States of America
This document may not, in whole or in part, be copied, photo-
copied, reproduced, translated, or reduced to any electronic
medium or machine readable form without prior written con-
sent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied war-
ranties of merchantability and fitness for a particular purpose.
M86 Security shall not be liable for any error or for incidental
or consequential damages in connection with the furnishing,
performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product,
the information described in this documentation is subject to
change without notice.
The latest version of this document can be obtained from
http://www.m86security.com/support/Enterprise-Reporter/doc-
umentation.asp
Trademarks
Other product names mentioned in this manual may be trade-
marks or registered trademarks of their respective companies
and are the sole property of their respective manufacturers.
Part# IR-ERS-UG_v1.01-1006

M86 SECURITY USER GUIDE iii
CONTENTS
E
NTERPRISE
R
EPORTER
O
VERVIEW
................................... 1
Operations ...................................................................................1
How to Use this User Guide .......................................................2
Organization ...................................................................................... 2
Conventions ...................................................................................... 3
Terminology ...................................................................................... 4
A
DMINISTRATOR
S
ECTION
................................................. 7
Introduction ................................................................................. 7
Components and Environment ..................................................8
Components ...................................................................................... 8
Hardware .................................................................................... 8
Software ..................................................................................... 8
Environment ...................................................................................... 9
Workstation Requirements ......................................................... 9
Network Requirements ............................................................... 9
Chapter 1: Accessing the Server .............................................10
Preliminary Network Settings .......................................................... 10
Procedures for Logging On, Off ...................................................... 10
Access the ER Administrator Login window ............................. 10
Access ER Admin Module from the IR Portal ..................... 11
Enter ER Admin Module’s URL in Address field ................. 12
Log On ...................................................................................... 13
Logging on the First Time ................................................... 15
Set up an Administrator Login ID.................................. 15
Log Off ...................................................................................... 16
Chapter 2: Configuring the ER Server .................................... 17
Administrator Console ..................................................................... 17
Network Menu .......................................................................... 17
Box Mode screen ............................................................... 18
Live Mode ..................................................................... 18
Archive Mode................................................................ 19

CONTENTS
iv M86 SECURITY USER GUIDE
Change the Box Mode .................................................. 19
Add/Edit/Delete Administrators screen ............................... 20
View a List of Administrators ........................................ 21
Add an Administrator .................................................... 21
Edit an Administrator’s Login ID ................................... 21
Delete an Administrator ................................................ 22
Locked-out Accounts and IPs screen ................................. 23
View Locked Accounts, IP addresses........................... 24
Unlock Accounts, IP addresses .................................... 24
Server Menu ............................................................................. 25
Backup screen ................................................................... 26
Backup and Recovery Procedures ............................... 26
Set up/Edit External Backup FTP Password ................ 28
Execute a Manual Backup ............................................ 28
Perform a Remote Backup ........................................... 29
Perform a Restoration to the ER Server ....................... 30
Self Monitoring screen ....................................................... 31
View a List of Contact E-Mail Addresses...................... 32
Set up and Activate Self-Monitoring ............................. 32
Remove Recipient from E-mail Notification List............ 32
Deactivate Self-Monitoring............................................ 32
Server Status screen........................................................... 33
View the Status of the Server ....................................... 34
Secure Access screen ....................................................... 35
Activate a Port to Access the Server ............................ 36
Terminate a Port Connection........................................ 37
Terminate All Port Connections .................................... 37
Software Update screen ..................................................... 38
View Installed Software Updates .................................. 39
Uninstall the Most Recently Applied Software Update . 39
View Available Software Updates................................. 39
Install a Software Update.............................................. 40
Shut Down screen............................................................... 43
Server Action Selections............................................... 43
Perform a Server Action ............................................... 44
Web Client Server Management screen ............................ 45
Restart the Web Client Server ...................................... 45
Enable/Disable the Web Client Scheduler.................... 46
Database Menu . ....................................................................... 47
User Name Identification screen ......................................... 47
View the User Name Identification screen.................... 50

CONTENTS
M86 SECURITY USER GUIDE v
Configure the Server to Log User Activity..................... 50
Deactivate User Name Identification ............................ 51
Username Display Setting screen ...................................... 52
View the Current Username Display Setting ................ 53
Modify the Username Display Setting........................... 53
Page View Elapsed Time screen ....................................... 55
Establish the Unit of Elapsed Time for Page Views...... 55
Elapsed Time Rules...................................................... 56
Page Definition screen ....................................................... 57
View the Current Page Types....................................... 57
Remove a Page Type ................................................... 58
Add a Page Type .......................................................... 58
Tools screen ....................................................................... 59
View Diagnostic Reports............................................... 60
View Database Status Logs.......................................... 60
Expiration screen ............................................................... 63
Expiration Screen Terminology..................................... 64
Expiration Rules............................................................ 65
View Data Storage Statistics ........................................ 66
Change Data Storage Settings ..................................... 69
Optional Features screen.................................................... 70
Enable Search String Reporting ................................... 72
Enable Block Request Count........................................ 72
Enable Blocked Searched Keywords............................ 72
Enable Wall Clock Time................................................ 73
Enable Page and/or Object Count ................................ 73
Enable, Configure Password Security Option............... 74
User Group Import screen .................................................. 77
Import User Groups ...................................................... 78
T
ECHNICAL
S
UPPORT
/ P
RODUCT
W
ARRANTIES
............... 79
Technical Support ..................................................................... 79
Hours ............................................................................................... 79
Contact Information ......................................................................... 79
Domestic (United States) .......................................................... 79
International .............................................................................. 79
E-Mail ....................................................................................... 79
Office Locations and Phone Numbers ...................................... 80
M86 Corporate Headquarters (USA)................................... 80
M86 Taiwan......................................................................... 80

CONTENTS
vi M86 SECURITY USER GUIDE
Support Procedures ........................................................................ 81
Product Warranties ................................................................... 82
Standard Warranty .......................................................................... 82
Technical Support and Service ....................................................... 83
Extended Warranty (optional) ......................................................... 84
Extended Technical Support and Service ....................................... 84
A
PPENDICES
S
ECTION
..................................................... 85
Appendix A ................................................................................ 85
Evaluation Mode ............................................................................. 85
Administrator Console .............................................................. 85
Use the Server in the Evaluation Mode .............................. 87
Expiration screen .......................................................... 87
Change the Evaluation Mode.............................................. 88
Activation Page............................................................. 89
Appendix B ................................................................................ 90
Disable Pop-up Blocking Software .................................................. 90
Yahoo! Toolbar Pop-up Blocker ...................................................... 90
Add the Client to the White List ................................................ 90
Google Toolbar Pop-up Blocker ...................................................... 92
Add the Client to the White List ................................................ 92
AdwareSafe Pop-up Blocker ........................................................... 93
Disable Pop-up Blocking .......................................................... 93
Windows XP SP2 Pop-up Blocker .................................................. 94
Set up Pop-up Blocking ............................................................ 94
Use the Internet Options dialog box.................................... 94
Use the IE Toolbar ............................................................. 95
Add the Client to the White List . ............................................... 96
Use the IE Toolbar .............................................................. 96
Use the Information Bar ..................................................... 97
Set up the Information Bar............................................ 97
Access the Client .......................................................... 97
I
NDEX
............................................................................. 99

ENTERPRISE REPORTER OVERVIEW OPERATIONS
M86 SECURITY USER GUIDE 1
ENTERPRISE REPORTER OVERVIEW
Though many companies have Internet filtering solutions to
prevent employees from accessing inappropriate, non-work
related Web sites, simply blocking these sites is not enough.
Administrators want the ability to know who is accessing
which site, the duration of each site visit, and the frequency
of these visits. This data can help administrators identify
abusers, develop policies, and target sites to be filtered, in
order to maximize bandwidth utilization and productivity.
The Enterprise Reporter (ER) from M86 Security is
designed to readily obtain this information, giving the user
the ability to interrogate massive datasets through flexible
drill-down technology, until the desired view is obtained.
This “view” can then be memorized and saved to a user-
defined report menu for repetitive, scheduled execution and
distribution.
Operations
In simplified terms, the ER operates as follows: the ER
Server accepts log files (text files containing Web access
data) from the M86 Web Filter. M86’s proprietary programs
“normalize” the transferred data and insert them into a
MySQL database. The ER Client reporting application
accesses this database to generate a virtually unlimited
number of queries and reports.

ENTERPRISE REPORTER OVERVIEW HOW TO USE THIS USER GUIDE
2M86 SECURITY USER GUIDE
How to Use this User Guide
Organization
This User Guide is organized into the following sections:
• Overview - This section provides information on how to
use this user guide to help you configure the ER Server.
• Administrator Section - Refer to this section for infor-
mation on configuring and maintaining the ER Server via
the Administrator console application.
• Tech Support / Product Warranties Section - This
section contains information on technical support and
product warranties.
• Appendices Section - Appendix A provides information
on how to use the ER Server in the evaluation mode, and
how to switch to the activated mode. Appendix B
explains how to disable many types of pop-up blocking
software.
• Index - This section includes an index of topics and the
first page numbers where they appear in this user guide.

ENTERPRISE REPORTER OVERVIEW HOW TO USE THIS USER GUIDE
M86 SECURITY USER GUIDE 3
Conventions
The following icons are used throughout this user guide:
NOTE: The “note” icon is followed by italicized text providing
additional information about the current topic.
TIP: The “tip” icon is followed by italicized text giving you hints on
how to execute a task more efficiently.
WARNING: The “warning” icon is followed by italicized text
cautioning you about making entries in the application, executing
certain processes or procedures, or the outcome of specified
actions.
IMPORTANT: The "important" icon is followed by italicized text
informing you about important information or procedures to follow
to ensure maximum uptime on the ER Server.

ENTERPRISE REPORTER OVERVIEW HOW TO USE THIS USER GUIDE
4M86 SECURITY USER GUIDE
Terminology
The following terms are used throughout this user guide.
Sample images (not to scale) are included for each item.
• alert box - a message box
that opens in response to
an entry you made in a
dialog box, window, or
screen. This box often
contains a button (usually
labeled “OK”) for you to
click in order to confirm or execute a command.
• button - an object in a dialog box, window,
or screen that can be clicked with your
mouse to execute a command.
• checkbox - a small square in a dialog
box, window, or screen used for indi-
cating whether or not you wish to select an option. This
object allows you to toggle between two choices. By
clicking in this box, a check mark or an “X” is placed, indi-
cating that you selected the option. When this box is not
checked, the option is not selected.
• dialog box - a box that
opens in response to a
command made in a
window or screen, and
requires your input. You
must choose an option by
clicking a button (such as
“Yes” or “No”, or “Next” or
“Cancel”) to execute your
command. As dictated by
this box, you also might
need to make one or more
entries or selections prior to clicking a button.

ENTERPRISE REPORTER OVERVIEW HOW TO USE THIS USER GUIDE
M86 SECURITY USER GUIDE 5
• field - an area in a dialog
box, window, or screen
that either accommodates your data entry, or displays
pertinent information. A text box is a type of field.
• frame - a boxed-in
area in a dialog box,
window, or screen
that includes a group
of objects such as fields, text boxes, list boxes, buttons,
radio buttons, and/or tables. Objects within a frame
belong to a specific function or group. A frame often is
labeled to indicate its function or purpose.
• list box - an area in a
dialog box, window, or
screen that accommo-
dates and/or displays
entries of items that can be added or removed.
• pop-up box or pop-up
window - a box or
window that opens after
you click a button in a
dialog box, window, or
screen. This box or
window may display
information, or may
require you to make
one or more entries.
Unlike a dialog box, you do not need to choose between
options.
• pull-down menu - a field in a
dialog box, window, or screen
that contains a down arrow to the right. When you click
the arrow, a menu of items displays from which you make
a selection.

ENTERPRISE REPORTER OVERVIEW HOW TO USE THIS USER GUIDE
6M86 SECURITY USER GUIDE
• radio button - a small, circular
object in a dialog box, window, or
screen used for selecting an option. This object allows
you to toggle between two choices. By clicking a radio
button, a dot is placed in the circle, indicating that you
selected the option. When the circle is empty, the option
is not selected.
• screen - a main object of
an application that
displays across your
monitor. A screen can
contain windows, frames,
fields, tables, text boxes,
list boxes, buttons, and
radio buttons.
• table - an area in a
window or screen
that contains items
previously entered or selected.
• text box - an area in
a dialog box,
window, or screen that accommodates your data entry. A
text box is a type of field.
• window - displays on a
screen, and can contain
frames, fields, text boxes, list
boxes, buttons, and radio
buttons. Types of windows
include ones from the
system such as the Save As
window, pop-up windows, or
login windows.

ADMINISTRATOR SECTION INTRODUCTION
M86 SECURITY USER GUIDE 7
ADMINISTRATOR SECTION
Introduction
The authorized administrator of the ER Server is respon-
sible for providing the Server a high-speed connection to the
remote Client workstations. To attain this objective, the
administrator performs the following tasks:
• provides a suitable environment for the Server, including:
• power connection protected by an Uninterruptible
Power Supply (UPS)
• high speed access to the Server by authorized Client
workstations
• adds new administrators
• sets up administrators for receiving automatic alerts
• updates the Server with software updates supplied by
M86 Security
• analyzes Server statistics
• utilizes diagnostics for monitoring the Server status to
ensure optimum functioning of the Server
• establishes and implements backup and restoration
procedures for the Server
Instructions on configuring and maintaining the ER Server
are documented in this section.
NOTE: Click the Help link beneath the banner in any screen of
the Administrator console to access a page with links to .pdf files
of the latest user guides for the M86 IR ER Administrator console
and ER Web Client.

ADMINISTRATOR SECTION COMPONENTS AND ENVIRONMENT
8M86 SECURITY USER GUIDE
Components and Environment
Components
Hardware
• High performance server
• One or more high-capacity hard drives
• Optional: One or more attached “NAS” storage devices
(e.g. Ethernet connected, SCSI/Fibre Channel
connected “SAN”)
Software
• Linux OS
• Administrator Graphical User Interface (GUI) console
utilized by an authorized administrator to configure and
maintain the ER Server
• MySQL database
• M86 proprietary Client application employed by report
users for generating “views” and reports

ADMINISTRATOR SECTION COMPONENTS AND ENVIRONMENT
M86 SECURITY USER GUIDE 9
Environment
Workstation Requirements
System requirements for the administrator include the
following:
• Windows XP, Vista, or 7 operating system running:
• Internet Explorer (IE) 7.0 or 8.0
• Firefox 3.5
• Macintosh OS X Version 10.5 or 10.6 running:
• Safari 4.0
• Firefox 3.5
• Pop-up blocking software, if installed, must be disabled
• Session cookies from the ER Server must be allowed in
order for the Administrator console to function properly
NOTE: Information about disabling pop-up blocking software can
be found in Appendix B: Disable Pop-up Blocking Software.
Network Requirements
• High speed connection from the ER Server to the Client
workstation(s)
• HTTPS connection to M86 Security’s software update
server

ADMINISTRATOR SECTION CHAPTER 1: ACCESSING THE SERVER
10 M86 SECURITY USER GUIDE
Chapter 1: Accessing the Server
Preliminary Network Settings
To initially set up your ER Server, follow the instructions in
the M86 IR Installation Guide booklet packaged with your IR
unit. This guide explains how to perform the initial configura-
tion of the Server so that it can be accessed via an IP
address on your network.
NOTE: If you do not have the M86 IR Administrator Installation
Guide, contact M86 Security immediately to have a copy sent to
you.
WARNING: In order to prevent data from being lost or corrupted
while the Server is running, the Server should be connected to a
UPS or other battery backup system.
Procedures for Logging On, Off
Access the ER Administrator Login window
WARNING: Once you turn on the Server, DO NOT interrupt the
initial boot-up process. This process may take from five to 10
minutes per drive. If the process is interrupted, damage to key
files may occur.
When the Server is fully booted, any workstation on the
network that can access the Server’s IP address (set up
during installation procedures) will be able to communicate
with the Server via the Internet.
The ER Administrator user interface is accessible in one of
two ways:
• by entering the IR’s URL in the Address field and then
clicking the ER Administration Module icon in the IR
Welcome window (see Access ER Admin Module from
the IR Portal)

ADMINISTRATOR SECTION CHAPTER 1: ACCESSING THE SERVER
M86 SECURITY USER GUIDE 11
• by entering the ER Administrator’s URL in the Address
field (see Enter ER Admin Module’s URL in Address
field)
Access ER Admin Module from the IR Portal
1. Launch an Internet browser window supported by the
Enterprise Reporter.
2. In the address line of the browser window, type in
“https://” and the IR server’s IP address or host name,
and use port number “:1443” for a secure network
connection.
For example, if your IP address is 210.10.131.34, type in
https://210.10.131.34:1443. Using a host name
example, if the host name is logo.com, type in https://
logo.com:1443.
3. Click the ER Administration Module icon in the IR
Welcome window:
Fig. 1:1-1 ER Administration Module icon in IR Welcome window
NOTE: If pop-up blocking software is installed on the workstation,
it must be disabled. Information about disabling pop-up blocking
software can be found in Appendix B: Disable Pop-up Blocking
Software.

ADMINISTRATOR SECTION CHAPTER 1: ACCESSING THE SERVER
12 M86 SECURITY USER GUIDE
Clicking the ER Administration Module icon launches a
separate browser window/tab containing the ER Admin-
istrator console Login window (see Fig. 1:1-2).
Enter ER Admin Module’s URL in Address field
1. Launch an Internet browser window supported by the ER
Server.
2. In the address line of the browser window, type in
“https://” and the ER Server’s IP address or host name,
and use port number “:8843” for a secure network
connection.
For example, if your IP address is 210.10.131.34, type in
https://210.10.131.34:8843. Using a host name
example, if the host name is logo.com, type in https://
logo.com:8843.
With a secure connection, the first time you attempt to
access the ER Server’s user interface in your browser
you will be prompted to accept the security certificate. In
order to accept the security certificate, follow the instruc-
tions at: http://www.m86security.com/software/8e6/
docs/ig/misc/sec-cert-er.pdf
3. After accepting the security certificate, click Go to open
the ER Administrator Login window (see Fig. 1:1-2).

ADMINISTRATOR SECTION CHAPTER 1: ACCESSING THE SERVER
M86 SECURITY USER GUIDE 13
Log On
1. In the login window, type in the generic Username
admin, and Password reporter, if you have not yet set
up your own user name and password. Otherwise, enter
your personal Username and Password:
Fig. 1:1-2 Login window
2. Click Login to go to the default Server Status screen of
the Administrator console (see Fig. 1:1-3).

ADMINISTRATOR SECTION CHAPTER 1: ACCESSING THE SERVER
14 M86 SECURITY USER GUIDE
Fig. 1:1-3 Server Status screen
The Server Status screen displays the current status of the
ER Server.
NOTES: See Server Status screen in the Server section of this
document for information about the contents and usage of this
screen.
If using this product in the Evaluation Mode the ER Status pop-up
window opens after logging into this application. Please see
Appendix A: Evaluation Mode for information about the Evalua-
tion Mode.
Table of contents
Other M86 Security Firewall manuals