M86 Security M86 Threat Analysis Reporter User manual

M86 Web Filtering and Reporting Suite
USER GUIDE
Software Version: 4.2.00
Document Version: 10.10.11

II M86 SECURITY USER GUIDE
M86 SECURITY WEB FILTERING AND
REPORTING SUITE USER GUIDE
© 2011 M86 Security
All rights reserved.
Version 1.01, published October 2011 for software release
4.2.00
Printed in the United States of America
This document may not, in whole or in part, be copied, photo-
copied, reproduced, translated, or reduced to any electronic
medium or machine readable form without prior written con-
sent from M86 Security.
Every effort has been made to ensure the accuracy of this
document. However, M86 Security makes no warranties with
respect to this documentation and disclaims any implied war-
ranties of merchantability and fitness for a particular purpose.
M86 Security shall not be liable for any error or for incidental
or consequential damages in connection with the furnishing,
performance, or use of this manual or the examples herein.
Due to future enhancements and modifications of this product,
the information described in this documentation is subject to
change without notice.
The latest version of this document can be obtained from
http://www.m86security.com/support/wfr/documentation.asp
Trademarks
Other product names mentioned in this manual may be trade-
marks or registered trademarks of their respective companies
and are the sole property of their respective manufacturers.
Part# WFR-UG_v1.01-1110

M86 SECURITY USER GUIDE iii
CONTENTS
WFR S
UITE
O
VERVIEW
..................................................... 1
How to Use this User Guide .......................................................2
Organization ......................................................................................2
Conventions ......................................................................................3
Components and Environment ..................................................4
Components ......................................................................................4
Hardware ....................................................................................4
Software .....................................................................................4
Environment ......................................................................................5
Network Requirements ...............................................................5
Administrator Workstation Requirements ...................................5
End User Workstation Requirements .........................................6
How to Use the WFR on the Web ...............................................7
Initial Setup .......................................................................................7
Access the WFR Welcome Window ..................................................7
Single Sign-On Access .....................................................................9
Access all applications from the SR UI .......................................9
Default Usernames and Passwords . ........................................10
Technical Support / Product Warranties .........................................10
W
EB
F
ILTER
I
NTRODUCTORY
S
ECTION
............................. 11
Web Filter ...................................................................................11
About this Portion of the User Guide ......................................11
Terminology ....................................................................................13
Overview ....................................................................................18
Chapter 1: Filtering Operations ...............................................19
Operational Modes ..........................................................................19
Invisible Mode ...........................................................................20
Router Mode .............................................................................22
Firewall Mode ...........................................................................23
Group Types ...................................................................................25

CONTENTS
iv M86 SECURITY USER GUIDE
Global Group ............................................................................25
IP Groups . ................................................................................26
Filtering Profile Types .....................................................................27
Static Filtering Profiles ..............................................................29
Master IP Group Filtering Profile.........................................29
IP Sub-Group Filtering Profile.............................................29
Individual IP Member Filtering Profile .................................29
Active Filtering Profiles .............................................................30
Global Filtering Profile.........................................................30
Override Account Profile .....................................................30
Time Profile.........................................................................30
Lock Profile .........................................................................30
Filtering Profile Components ...........................................................31
Library Categories . ...................................................................32
M86 Supplied Categories....................................................32
Custom Categories .............................................................32
Service Ports . ...........................................................................33
Rules ........................................................................................33
Minimum Filtering Level ............................................................33
Filter Settings ............................................................................34
Filtering Rules .................................................................................35
Filtering Levels Applied ............................................................35
Chapter 2: Logging and Blocking ............................................38
Web Access Logging ......................................................................38
Instant Messaging, Peer-to-Peer Blocking ......................................38
How IM and P2P Blocking Works .............................................38
IM Blocking..........................................................................38
P2P Blocking.......................................................................39
Setting up IM and P2P ..............................................................40
Using IM and P2P .....................................................................40
Block IM, P2P for All Users ................................................41
Block Specified Entities from Using IM, P2P ......................42
Chapter 3: Synchronizing Multiple Units ................................43
Web Filter Synchronization .............................................................43
Synchronization Setup ....................................................................45
Setting up a Source Server ......................................................45
Setting up a Target Server .......................................................45
Types of Synchronization Processes ..............................................46
Filtering Profile Synchronization Process .................................46

CONTENTS
M86 SECURITY USER GUIDE v
Library Synchronization Process ..............................................47
Delays in Synchronization ...............................................................48
Synchronized, Non-Synchronized Items .........................................49
Synchronize All Items ...............................................................50
Synchronized Items (All) .....................................................50
Functionally Synchronized Items ........................................50
Non-synchronized Items .....................................................51
Synchronize Only Library Items ................................................52
Synchronized Items (Library Only)......................................52
Functionally Synchronized Items ........................................52
Non-synchronized Items .....................................................52
Server Maintenance Procedures .....................................................54
Source Server Failure Scenarios ..............................................54
Establish Backup Procedures ...................................................54
Use a Backup File to Set up a Source Server ..........................55
Set up a Target Server as a Source Server........................55
Set up a Replacement Target Server .................................56
Set up a New Source Server from Scratch ...............................56
Set up a Target Server as a Source Server........................56
Chapter 4: Getting Started .......................................................57
Using the Administrator Console .....................................................57
Access the Web Filter Login window ........................................57
Access the Web Filter from the WFR Portal .......................57
Enter Web Filter’s URL in the Address field .......................58
Log In ........................................................................................59
Last Library Update message .............................................60
Navigation Tips .........................................................................62
Access Main Sections.........................................................62
Help Features .....................................................................64
Screen and Window Navigation .........................................67
Console Tips and Shortcuts ...............................................72
Log Out .....................................................................................76
WF G
LOBAL
A
DMINISTRATOR
S
ECTION
........................... 77
Introduction ...............................................................................77
Chapter 1: System screen ........................................................78
Control .............................................................................................80
Filter window .............................................................................80

CONTENTS
vi M86 SECURITY USER GUIDE
Local Filtering......................................................................81
HTTP Filtering.....................................................................82
HTTPS Filtering ..................................................................83
Service Control....................................................................84
Target(s) Filtering................................................................85
Block Page Authentication window ...........................................86
Enter, Edit Block Page Options ..........................................87
Block page ..........................................................................88
Options page.......................................................................90
ShutDown window ....................................................................93
Shut Down the Server.........................................................93
Reboot window .........................................................................94
Reboot the Server...............................................................94
Network ...........................................................................................96
LAN Settings window ................................................................96
Specify LAN Settings .........................................................97
NTP Servers window ................................................................98
Specify Network Time Protocol Servers .............................99
Regional Setting window . .......................................................100
Specify the Time Zone, Language Set..............................100
Block Page Route Table window ............................................101
Add a Router ....................................................................102
Remove a Router..............................................................102
Administrator .................................................................................103
Administrator window .............................................................103
View Administrator Accounts ............................................104
Add an Administrator Account...........................................104
Edit an Administrator Account ..........................................105
Delete an Administrator Account.......................................105
Secure Logon ................................................................................106
Logon Settings window ...........................................................106
Enable, Disable Password Expiration...............................107
Enable, Disable Account Lockout ....................................108
Logon Management ................................................................110
View User Account Status, Unlock Username .................111
View Locked IP Address, Unlock IP Address....................112
View Admin, Sub Admin User Interface Access ..............113
Diagnostics ....................................................................................114
System Command window .....................................................114
Perform a Diagnostic Test, View Data .............................115
Command Selections........................................................116

CONTENTS
M86 SECURITY USER GUIDE vii
View Log File window .............................................................120
View Log Results ..............................................................120
Troubleshooting Mode window ...............................................122
Use the Troubleshooting Mode ........................................123
Active Profile Lookup window .................................................124
Verify Whether a Profile is Active .....................................125
Admin Audit Trail window .......................................................128
Admin Audit Trail...............................................................128
View .................................................................................130
Alert ...............................................................................................131
Alert Settings window .............................................................131
Enable the Alert Feature ..................................................133
Modify Alert Settings.........................................................133
Disable the Alert Feature ..................................................133
SMTP Server Settings window ...............................................134
Enter, Edit SMTP Server Settings.....................................134
Verify SMTP Settings........................................................135
Software Update ...........................................................................136
Local Software Update window ..............................................136
Read Information about a Software Update......................137
Select and Apply a Software Update ...............................138
Undo an Applied Software Update....................................142
Software Update Log window .................................................143
View Log Contents............................................................143
Download Log, View, Print Contents ................................144
Synchronization .............................................................................148
Setup window . ........................................................................149
Using Only One Web Filter on the Network......................149
Using More than One Web Filter on the Network .............150
Status window ........................................................................155
View the Sync Status of Targets from the Source ...........156
Place Items in Queue for Syncing.....................................158
View the Sync Status of the Target Server .......................158
Mode .............................................................................................160
Operation Mode window .........................................................160
Set the Operation Mode ...................................................161
Specify the Listening Device.............................................161
Specify the Block Page Device.........................................161
Invisible Option: Specify the Block Page Delivery.............162
ICAP Option: Specify ICAP Server Settings .....................163
Mobile Option: Specify the Mobile Client Control .............165

CONTENTS
viii M86 SECURITY USER GUIDE
Apply Operation Mode Settings ........................................165
Proxy Environment Settings window ......................................165
Use a Local Proxy Server .................................................166
Use Proxy Port 80.............................................................166
Enable HTTPS Filtering ....................................................166
Authentication ...............................................................................167
Backup/Restore .............................................................................168
Backup/Restore window .........................................................168
Backup Procedures...........................................................169
Perform a Backup on Demand .........................................170
Schedule a Backup ..........................................................171
Download a File ...............................................................176
Perform a Restoration ......................................................177
Remove a Backup File......................................................178
View Backup and Restoration Details ..............................179
Reset .............................................................................................180
Reset window .........................................................................180
Radius Authentication Settings .....................................................181
Radius Authentication Settings window ..................................181
Enable Radius...................................................................182
Disable Radius..................................................................183
SNMP ............................................................................................184
SNMP window ........................................................................184
Enable SNMP....................................................................184
Specify Monitoring Settings ..............................................185
Hardware Failure Detection ..........................................................186
Hardware Failure Detection window .......................................186
View the Status of the Hard Drives ...................................187
X Strikes Blocking .........................................................................188
X Strikes Blocking window ......................................................188
Configuration.....................................................................189
Lock Page ...............................................................................190
Email Alert ........................................................................193
Logon Accounts ...............................................................195
Categories.........................................................................197
Go to X Strikes Unlock Workstation GUI ..........................198
X Strikes Unlock Workstation ...........................................199
Warn Option Setting ......................................................................202
Warn Option Setting window ..................................................202
Specify Interval for Re-displaying the Warn page.............203
Customization ...............................................................................204

CONTENTS
M86 SECURITY USER GUIDE ix
Common Customization window . ...........................................205
Enable, Disable Features .................................................206
Lock Page Customization window ..........................................208
Edit Entries, Setting ..........................................................209
Preview Sample Lock Page .............................................210
Block Page Customization window .........................................211
Add, Edit Entries ...............................................................212
Preview Sample Block Page ............................................213
Warn Page Customization window .........................................215
Add, Edit Entries ..............................................................216
Preview Sample Warning Page .......................................217
Profile Control window ............................................................219
Edit Entries........................................................................220
Quota Block Page Customization window ..............................221
Add, Edit Entries ...............................................................221
Preview Sample Quota Block Page..................................222
Quota Notice Page Customization window .............................224
Add, Edit Entries ...............................................................224
Preview Sample Quota Notice Page.................................225
CMC Management ........................................................................227
Software Update Management window ..................................227
View Software Update Information....................................227
Apply or Undo a Software Update ....................................229
Status window . .......................................................................230
View Filtering Status Information ......................................230
Quota Setting ................................................................................232
Quota Setting window .............................................................232
Configure Quota Hit Settings ...........................................233
Reset Quotas ...................................................................234
Quota Notice page............................................................235
Quota Block page .............................................................237
SSL Certificate ..............................................................................238
SSL Certificate window ...........................................................238
Chapter 2: Policy screen ........................................................239
Global Group .................................................................................241
Range to Detect window .........................................................241
Add a Segment to the Network.........................................242
Modify a Segment of the Network ....................................250
Remove a Segment from the Network..............................250
Rules window . ........................................................................251

CONTENTS
xM86 SECURITY USER GUIDE
View Criteria for a Rule.....................................................251
Add a Rule ........................................................................252
Modify a Rule....................................................................254
Copy a Rule ......................................................................254
Remove a Rule .................................................................255
Global Group Profile window ..................................................255
Category Profile ...............................................................256
Port....................................................................................258
Default Redirect URL ........................................................259
Filter Options.....................................................................260
Override Account window .......................................................264
Add an Override Account .................................................265
Edit an Override Account..................................................272
Delete an Override Account..............................................273
Approved Content Settings window ........................................274
Approved Content feature and VuSafe.............................274
Approved Content setup and configuration.......................275
Minimum Filtering Level window .............................................277
Minimum Filtering Categories ..........................................278
Port ...................................................................................280
Minimum Filtering Bypass Options....................................281
Refresh All ..............................................................................282
Refresh All Main Branches................................................282
IP ...................................................................................................283
Add Group ..............................................................................283
Add a Master IP Group .....................................................283
Refresh ...................................................................................284
Refresh IP Groups ............................................................284
Chapter 3: Library screen .......................................................285
Updates .........................................................................................287
Configuration window .............................................................287
Set a Time for Updates to be Retrieved............................287
Optional: Specify a Proxy Server .....................................288
Select the Log Level..........................................................288
Manual Update window . .........................................................289
Specify the Type of On Demand Update ..........................289
Additional Language Support window . ...................................291
Select Additional Languages.............................................291
Library Update Log window ....................................................292
View the Library Update Process......................................292

CONTENTS
M86 SECURITY USER GUIDE xi
Download Log, View, Print Contents ................................293
Emergency Update Log window .............................................297
View the Emergency Software Update Process ...............297
Download the Software Update Log File ..........................298
Library Lookup ..............................................................................299
Library Lookup window ...........................................................299
URL Lookup, Removal......................................................299
Search Engine Keyword Lookup, Removal.......................301
Reload the Library ............................................................302
Customer Feedback Module .........................................................303
Customer Feedback Module window ......................................303
Disable Customer Feedback Module................................304
Enable Customer Feedback Module.................................304
Category Weight System ..............................................................307
Category Weight System window ...........................................307
View the Current Selections .............................................308
Method for Weighting Library Categories..........................308
Weighting Library Categories ...........................................309
NNTP Newsgroup .........................................................................310
NNTP Newsgroup window ......................................................310
Add a Newsgroup to the Library........................................310
Remove a Newsgroup from the Library ...........................311
Pattern Detection Whitelist ............................................................312
Pattern Detection Whitelist window ........................................312
Create, Maintain a Whitelist of IP Addresses ...................313
Category Groups ...........................................................................314
Library Details window ............................................................315
View Library Details ..........................................................315
URLs window ..........................................................................316
View a List of URLs in the Library Category ....................317
Add or Remove URLs, Reload the Library .......................318
URL Keywords window ...........................................................321
View a List of URL Keywords ...........................................322
Add or Remove URL Keywords ........................................322
Upload a List of URL Keywords to the Library .................323
Reload the Library.............................................................324
Search Engine Keywords window . .........................................325
View a List of Search Engine Keywords ...........................326
Add or Remove Search Engine Keywords........................326
Upload a List of Search Engine Keywords........................327
Reload the Library.............................................................328

CONTENTS
xii M86 SECURITY USER GUIDE
Chapter 4: Reporting screen ..................................................329
Report Configuration .....................................................................330
Report Configuration window .................................................330
Execute Log Transfer Now................................................330
Real Time Probe ...........................................................................331
Real Time Probe window ........................................................331
Configuration.....................................................................331
Report Recipients .............................................................333
Logon Accounts ...............................................................335
Go to Real Time Probe Reports GUI ...............................337
Real Time Probe Reports .................................................338
Usage Graphs ...............................................................................346
Usage Graphs window ...........................................................346
Select a Graph to View ....................................................347
Shadow Log Format ......................................................................349
Shadow Log Format window ..................................................349
Specify the Shadow Log Format.......................................349
Apply Setting.....................................................................350
WF G
ROUP
A
DMINISTRATOR
S
ECTION
........................... 351
Introduction .............................................................................351
Chapter 1: Policy screen ........................................................352
IP ...................................................................................................353
Refresh ...................................................................................353
Refresh the Master IP Group, Member.............................353
Master IP Group ............................................................................354
Group Details window .............................................................354
Change the Group Administrator Password......................354
Members window ....................................................................355
Add the IP Address of the Member ..................................356
Remove a Member from the Group ..................................356
Override Account window .......................................................357
Add an Override Account..................................................358
Edit an Override Account..................................................365
Delete an Override Account .............................................366
Group Profile window .............................................................366
Category Profile ................................................................366
Redirect URL ....................................................................370
Filter Options ....................................................................371

CONTENTS
M86 SECURITY USER GUIDE xiii
Exception URL window ...........................................................374
Valid URL entries .............................................................375
Add URLs to Block URL or ByPass URL frame ...............376
Remove URLs from Block URL or ByPass URL frame ....379
Apply Settings...................................................................380
Time Profile window ...............................................................380
Add a Time Profile ............................................................381
Modify a Time Profile .......................................................391
Delete a Time Profile.........................................................391
Approved Content Settings window ........................................392
Approved Content setup and configuration.......................392
Upload/Download IP Profile window .......................................395
Upload IP Profiles .............................................................395
Download Profile ..............................................................397
Add Sub Group .......................................................................398
Add an IP Sub Group........................................................398
Add Individual IP .....................................................................399
Add an Individual IP Member............................................399
Delete Group ..........................................................................400
Delete a Master IP Group Profile......................................400
Paste Sub Group ....................................................................400
Paste a Copied IP Sub Group...........................................400
Sub Group .....................................................................................401
Sub Group (IP Group) window ...............................................401
View IP Sub-Group Details ...............................................401
Add IP Sub-Group Details.................................................402
Members window ....................................................................403
Modify Sub-Group Members ............................................404
Sub Group Profile window ......................................................404
Exception URL window ...........................................................405
Time Profile window ...............................................................405
Approved Content Settings window ........................................406
Delete Sub Group ...................................................................407
Delete an IP Sub-Group....................................................407
Copy Sub Group .....................................................................407
Copy an IP Sub-Group......................................................407
Individual IP ...................................................................................408
Member window .....................................................................408
Enter the IP Address of the Member ................................409
Individual IP Profile window ....................................................409
Exception URL window ...........................................................409

CONTENTS
xiv M86 SECURITY USER GUIDE
Time Profile window ...............................................................409
Approved Content Settings window ........................................410
Delete Individual IP .................................................................410
Delete an Individual IP Member........................................410
Chapter 2: Library screen .......................................................411
Library Lookup ..............................................................................412
Library Lookup window ...........................................................412
Look up a URL .................................................................413
Look up a Search Engine Keyword ..................................414
Custom Categories .......................................................................414
Add Category ..........................................................................415
Add a Custom Library Category........................................415
Refresh ...................................................................................416
Refresh the Library............................................................416
Custom library category ................................................................417
Library Details window ............................................................417
View, Edit Library Details..................................................418
URLs window ..........................................................................419
View a List of URLs in the Library Category ....................420
Add or Remove URLs or Wildcard URLs .........................421
Upload a Master List to the Library...................................423
Reload the Library.............................................................427
URL Keywords window ...........................................................427
View a List of URL Keywords............................................428
Add or Remove URL Keywords ........................................428
Upload a List of URL Keywords to the Library .................429
Reload the Library.............................................................429
Search Engine Keywords window . .........................................430
View a List of Search Engine Keywords ...........................431
Add or Remove Search Engine Keywords........................431
Upload a Master List of Search Engine Keywords ...........432
Reload the Library.............................................................432
Delete Category ......................................................................432
Delete a Custom Category................................................432
W
EB
F
ILTER
A
PPENDICES
S
ECTION
............................... 433
Appendix A ..............................................................................433
Filtering Profile Format and Rules .................................................433
Rule Criteria ............................................................................434

CONTENTS
M86 SECURITY USER GUIDE xv
Appendix B ..............................................................................437
Create a Custom Block Page ........................................................437
Part I: Modify the Web Filter ...................................................437
1. Enable block page redirection.......................................437
2. Exclude filtering <server for block page> IP..................438
Part II: Customize the Block Page ..........................................438
1. Set up a Web server .....................................................438
2. Create a customized block page...................................438
Part III: Restart the Web Filter ................................................440
Reference ...............................................................................441
HTML ................................................................................441
CGI written in Perl ............................................................443
CGI written in C.................................................................445
Appendix C ..............................................................................451
Override Pop-up Blockers .............................................................451
Yahoo! Toolbar Pop-up Blocker ....................................................452
If Pop-up Blocking is Enabled .................................................452
Add Override Account to the White List ..................................452
Google Toolbar Pop-up Blocker ....................................................454
If Pop-up Blocking is Enabled .................................................454
Add Override Account to the White List ..................................454
AdwareSafe Pop-up Blocker .........................................................455
If Pop-up Blocking is Enabled .................................................455
Temporarily Disable Pop-up Blocking .....................................455
Mozilla Firefox Pop-up Blocker .....................................................456
Add Override Account to the White List ..................................456
Windows XP SP2 Pop-up Blocker ................................................458
Set up Pop-up Blocking ..........................................................458
Use the Internet Options dialog box..................................458
Use the IE Toolbar ...........................................................459
Temporarily Disable Pop-up Blocking .....................................459
Add Override Account to the White List ..................................460
Use the IE Toolbar............................................................460
Use the Information Bar ...................................................461
Appendix D ..............................................................................463
Mobile Client .................................................................................463
Environment Requirements ....................................................464
Workstation Requirements................................................464
Network Requirement ......................................................465

CONTENTS
xvi M86 SECURITY USER GUIDE
Remote Filtering Components ..........................................465
Work Flow Overview ...............................................................465
Mobile Client Installed on a Mobile PC .............................465
Network Operations Overview ................................................466
Mobile Client on the Network............................................466
Mobile Server Section ............................................................466
Initial Setup .......................................................................466
Configure the Web Filter to use the Mobile Mode ............467
Add MAC Addresses to the Master IP Group ...................468
Select MAC Addresses for a Sub Group...........................469
View Sub Group MAC Addresses.....................................470
Add a MAC Address to an Individual Member ..................471
Upload MAC Address File for IP Group ...........................472
Troubleshoot MAC Addresses .........................................473
Mobile Client Section ..............................................................474
Download and Install the Deployment Kit ........................475
Access the Mobile Client Deployment Tool window .........478
Configure a New Package Set .........................................479
Edit a Package Configuration ...........................................493
View Package Configuration contents ..............................495
MCU file preparations ......................................................496
MC Deployment to Windows Computers .........................501
MC Deployment to Macintosh OS X Computers...............504
Mobile Client Removal from Computers ..........................505
Appendix E ..............................................................................508
Glossary ........................................................................................508
SR I
NTRODUCTORY
S
ECTION
........................................ 515
Security Reporter Overview ...................................................515
About this Portion of the User Guide ....................................516
Terminology ..................................................................................518
Getting Started ........................................................................522
Procedures for Logging In, Out .....................................................522
Access the Security Reporter Login window ..........................522
Access SR Report Manager from the WFR Portal............522
Enter Report Manager’s URL in the Address field............523
Log In ......................................................................................524

CONTENTS
M86 SECURITY USER GUIDE xvii
Re-login.............................................................................526
Expired Passwords ..........................................................527
Forgot Your Password .....................................................528
User Interface Navigation .......................................................530
Links in the Report Manager Navigation Toolbar..............530
Links in the System Configuration Navigation Toolbar .....533
Log Out ...................................................................................534
SR S
YSTEM
C
ONFIGURATION
S
ECTION
.......................... 535
Introduction .............................................................................535
Chapter 1: Access System Configuration ............................536
Chapter 2: Configuring the Server ........................................537
Network Menu ...............................................................................537
Box Mode screen ....................................................................538
Live Mode..........................................................................538
Archive Mode ...................................................................539
Change the Box Mode ......................................................539
Locked-out Accounts and IPs screen .....................................540
View Locked Accounts, IP addresses...............................541
Unlock Accounts, IP addresses ........................................541
Server Menu ..................................................................................542
Backup screen ........................................................................542
Backup and Recovery Procedures....................................543
Set up/Edit External Backup FTP Password.....................544
Execute a Manual Backup ................................................544
Perform a Remote Backup................................................545
Perform a Restoration to the SR.......................................546
Self Monitoring screen ............................................................547
View a List of Contact E-Mail Addresses .........................548
Set up and Activate Self-Monitoring..................................548
Remove Recipient from E-mail Notification List................548
Deactivate Self-Monitoring................................................548
Server Status screen ..............................................................549
View the Status of the Server ...........................................550
Secure Access screen ............................................................551
Activate a Port to Access the SR ......................................551
Terminate a Port Connection............................................552
Terminate All Port Connections ........................................552

CONTENTS
xviii M86 SECURITY USER GUIDE
Shut Down screen . .................................................................553
SR Action Selections.........................................................553
Perform a Server Action ...................................................554
Report Manager screen ..........................................................555
Restart the Report Manager..............................................555
Enable/Disable the Report Manager Scheduler ...............556
Database Menu .............................................................................557
User Name Identification screen ............................................557
View the User Name Identification screen .......................560
Configure the Server to Log User Activity.........................560
Page View Elapsed Time screen ............................................561
Establish the Unit of Elapsed Time for Page Views..........561
Elapsed Time Rules .........................................................562
Page Definition screen . ..........................................................563
View the Current Page Types...........................................563
Remove a Page Type ......................................................564
Add a Page Type ..............................................................564
Tools screen ...........................................................................565
View Diagnostic Reports ..................................................566
View Database Status Logs..............................................566
Generate Technical Support Report Package ..................568
Expiration screen ....................................................................569
Expiration Rules................................................................570
View Data Storage Statistics ............................................571
Optional Features screen .......................................................572
Enable Search String Reporting .......................................574
Enable Block Request Count ............................................574
Enable Blocked Searched Keywords................................574
Enable Time Usage reports ..............................................575
Enable Page and/or Object Count ....................................575
Enable, Configure Password Security Option...................576
User Group Import screen ......................................................579
Import User Groups ..........................................................580
SR R
EPORT
M
ANAGER
A
DMINISTRATION
S
ECTION
........ 581
Introduction .............................................................................581
Chapter 1: Group, Profile Management ................................583
User Groups panel ........................................................................583
View User Group Information . ................................................586

CONTENTS
M86 SECURITY USER GUIDE xix
User group status key .......................................................586
View a list of members in a user group.............................586
Add a User Group ...................................................................588
Patterns sub-panel............................................................589
IP Ranges sub-panel.........................................................591
Single Users/Exclude sub-panel ......................................594
Edit a User Group ...................................................................597
Rebuild the User Group ..........................................................598
Delete a User Group ...............................................................598
Admin Groups panel .....................................................................599
Add a Group ...........................................................................600
View, Edit Administrator Group Permissions ..........................602
View Administrator Group settings....................................602
Edit Administrator Group settings ....................................603
Delete an Administrator Group ...............................................603
Admin Profiles panel .....................................................................604
Add an Administrator Profile ...................................................606
View, Edit Admin Detail . .........................................................609
View Admin Details ...........................................................609
Edit Account Info...............................................................610
Delete Admin ..........................................................................611
Chapter 2: Database Management ........................................612
HTTPS Configuration panel ..........................................................612
Generate a Self-Signed Certificate for the SR ........................613
Create, Upload a Third Party Certificate .................................614
Step A: Create a CSR.......................................................614
Step B: Download the CSR, Submit to Agency.................615
Step C: Upload the Signed SSL Certificate to SR ............616
Download, Delete a Third Party Certificate .............................617
Download the SSL Certificate...........................................617
Delete the SSL Certificate.................................................617
User Profiles panel ........................................................................618
Search the User Database .....................................................619
View End User Activity......................................................619
Activity View panel ........................................................................620
Perform a Search on a Specified Activity . ..............................621
Search results...................................................................622
Device Registry panel ...................................................................624
Removing/adding Web Filter, SWG devices ...........................626
Web Filter Device Maintenance ..............................................627

CONTENTS
xx M86 SECURITY USER GUIDE
Add a Web Filter to the device registry .............................627
View, edit Web Filter device criteria..................................627
Delete a Web Filter from the device registry.....................628
Security Reporter Maintenance ..............................................629
View SR device criteria .....................................................629
Add, remove a bandwidth range ......................................630
View Other Device Criteria .....................................................630
View SMTP device criteria................................................630
View Patch Server device criteria .....................................631
View Proxy Server device criteria .....................................631
View NTP Server device criteria .......................................632
Refresh Settings .....................................................................632
SWG Policy Server Device Maintenance ...............................633
Add the first Policy Server to the device registry...............633
Add another Policy Server to the device registry ..............634
Edit Policy Server criteria, change password....................635
Delete a Policy Server from the device registry ...............637
LDAP Server Device Management .........................................637
Add an LDAP Server to the device registry.......................637
Import LDAP Group profiles .............................................639
View, edit LDAP Server device criteria .............................639
Delete an LDAP Server from the device registry ..............640
Database Processes List panel .....................................................641
View Details on a Process ......................................................642
Terminate a Process ..............................................................642
Server Information panel ...............................................................643
Mode .......................................................................................644
Registered Mode and Evaluation Mode............................644
Date Scopes ...........................................................................645
Report Manager Startup Time ................................................645
Server Info ..............................................................................645
Server Activity .........................................................................646
Expiration Info .........................................................................650
Reset to Factory Defaults panel ....................................................651
Reset SR to factory defaults ...................................................652
Wizard panel ...........................................................................653
Main Administrator ...........................................................654
Bandwidth Range and Web Filter Setup...........................654
Secure Web Gateway Setup.............................................655
Save Entries .....................................................................656
Table of contents
Other M86 Security Network Hardware manuals
Popular Network Hardware manuals by other brands

Northern Telecom
Northern Telecom NAC installation guide

Panduit
Panduit GP6 Plus installation instructions

ZyXEL Communications
ZyXEL Communications Network Storage Appliance NSA-220 Specifications

OVS
OVS LTN8608-P8 quick start guide

HiBoost
HiBoost Hi17-5S-Plus user manual

Vicon
Vicon Kollector Elite quick guide

Cisco
Cisco AIR-BR350-A-K9 - Aironet 350 Wireless Bridge Hardware installation guide

Engage Black
Engage Black BlackDoor Duo user guide

3xLogic
3xLogic V250 quick start guide

ADC
ADC OmniReach NCX-1000s Specification sheet

ADTRAN
ADTRAN HDSL 3192 HTU-C Installation and maintenance practice

Valcom
Valcom VIP-997 manual