
CONTENTS
2M86 SECURITY EVALUATION GUIDE
Step C: Specify Filters .....................................................................................................22
Step D: Specify Other Report Components .....................................................................23
Step E: Specify when to Generate the Report .................................................................23
Step F: Save the Report . .................................................................................................24
Export Summary Drill Down Reports. ......................................................................... 27
How to export selected records .............................................................................................. 27
Step A: Select records to be exported ............................................................................. 27
Step B: Specify Data to Export ........................................................................................27
Step C: Export data via Email or PDF Download ............................................................ 27
Email option ............................................................................................................... 27
View and print options................................................................................................28
Sample report file formats ......................................................................................................29
Summary Drill Down Reporting tools. ........................................................................ 30
How to use other Summary Drill Down Report tools ..............................................................30
Limit Detail Result ............................................................................................................30
Report fields ....................................................................................................................30
Type field.................................................................................................................... 30
Date Scope and Date fields .......................................................................................30
# Records fields .........................................................................................................31
Filter and Filter String fields ...................................................................................... 32
Sort By and Limit summary result to fields.................................................................32
Break Type field .........................................................................................................32
Format field ................................................................................................................ 32
For additional-break reports only .............................................................................. 33
For pie and bar charts only ........................................................................................ 33
Hide un-Identified IPs checkbox.................................................................................33
E-Mail / For e-mail output only fields ..........................................................................34
Commonly used reports............................................................................................... 35
How to generate a Sample Report .........................................................................................35
Report format ...................................................................................................................36
Examples of available Sample Reports . .......................................................................... 37
Sample Report 1: “Top 20 Users by Category/User” .................................................37
Sample Report 2: “Top 20 Sites by User/Site” ...........................................................37
Sample Report 3: “By Category/User/Site” ................................................................38
S
ECTION
2: R
EAL
T
IME
R
EPORTS
..................................................................39
Understand the most common and useful features. ................................................. 39
Monitor URL gauges. .................................................................................................... 39
How to drill down into a URL gauge .......................................................................................40
Step A: How to read a URL gauge ..................................................................................40
Gauge Name..............................................................................................................40
Gauge Score .............................................................................................................. 40
Timespan ................................................................................................................... 40
Threat Level .............................................................................................................. 41
Step B: Identify the source of a gauge’s activity ..............................................................41
Step C: View a list of Threats the end user accessed . ....................................................42
Step D: View URLs visited by the end user .....................................................................42
Step E: Further investigate a user’s activity .....................................................................43
How to view URL Trend Reports ............................................................................................ 44
Step A: View overall activity in URL gauges .................................................................... 44
Step B: View a line chart for a single URL gauge ............................................................45
How to view a pie chart for a URL gauge ...............................................................................46