CONTENTS
8E6 TECHNOLOGIES, THREAT ANALYSIS REPORTER USER GUIDE vii
Assign a Threat Score Weight ........................................................ 52
Chapter 2: Custom Gauge Setup, Usage ................................ 53
Add a Gauge ................................................................................... 54
Add Gauge Information ............................................................ 55
Sync All Categories . ................................................................. 56
Select Library Categories ......................................................... 56
Assign User Groups . ................................................................ 57
View, edit library components ................................................... 58
Gauge Components and Activity ..................................................... 60
Types of gauges ....................................................................... 60
Read a gauge . .......................................................................... 61
Modify a Gauge ............................................................................... 63
Edit gauge settings ................................................................... 63
Hide, Show a URL Gauge ............................................................... 65
Temporarily hide a URL gauge ................................................. 65
Save settings for hiding a URL gauge . ..................................... 66
Delete a Gauge ............................................................................... 67
View End User Gauge Activity ........................................................ 69
View Overall Ranking . .............................................................. 70
View a URL gauge ranking table . ............................................. 71
View a library category gauge ranking table ............................. 72
Monitor, Restrict End User Activity .................................................. 74
View a list of categories accessed by the user ......................... 75
View a list of URLs accessed by the user ................................. 77
Manually lock out an end user .................................................. 78
End user workstation lockout ............................................. 81
Chapter 3: Alerts, Lockout Management ................................ 83
Add an Alert .................................................................................... 84
Email alert function ................................................................... 85
Configure email alerts ......................................................... 85
Receive email alerts ........................................................... 86
Lockout function ....................................................................... 86
Configure automatic lockouts.............................................. 86
System Tray alert function ........................................................ 87
View, Modify, Delete an Alert .......................................................... 87
View alert settings .................................................................... 88
Modify an alert . ......................................................................... 89
Delete an alert . ......................................................................... 90
View the Alert Log ........................................................................... 91