McAfee QUICKCLEAN 1.0 User's Guide Page 8

  • Download
  • Add to my manuals
  • Print
  • Page
    / 74
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 7
MySQL v5.0
Microsoft SQL Server 2005
Microsoft SQL Server 2008
Log sources — Log sources are devices on the network set up to generate (web filtering device)
or store (FTP server) log files. Log files contain web filtering data that includes information such as
user names, IP addresses, URLs, time stamps, protocols, and so on. Content Security Reporter receives
or collects and processes the log files and then imports the data into the database. Log sources
include:
McAfee Web Gateway 6.x (Webwasher) — Auto Discover
McAfee SmartFilter IFP SFv4 — Text format
McAfee Firewall Enterprise (Sidewinder) SFv4 — Text
Format
McAfee SaaS Web Protection service
McAfee SiteAdvisor Enterprise
Format
McAfee Web Security Format
Blue Coat SG — Auto Discover
McAfee Content Security Reporter features
Review information about Content Security Reporter features to determine how you set up your
reporting en
vironment.
Table 1-1 Features
Feature Description
ePolicy
Orchestrator
integration
Content Security Reporter slots seamlessly into the ePolicy Orchestrator
interface
offering all standard ePolicy Orchestrator features and functions.
Content Security
Reporter
dashboards
Configurable dashboards give you visibility into your enterprise network usage.
You can add Content Security Reporter queries (in the form of Dashboard Monitors)
to the existing ePolicy Orchestrator dashboards, or to any number of
customized dashboards to provide detailed overviews of your network traffic.
Reports A set of default Content Security Reporter reports are installed that can be used
as they
are or customized to create useful data about web usage, policy
enforcement, productivity, and security threats in your organization.
Reports can be scheduled to run at a frequency and time that you want (Menu |
Automation | Server Tasks).
Queries A set of default Content Security Reporter queries are installed that can be run
as they
are or customized, and used to provide information within reports in a
variety of formats, and used as dashboard monitors.
Content Security Reporter queries can be added to other ePolicy Orchestrator
dashboards and reports, not just those installed by Content Security Reporter.
Queries can be scheduled to run at a frequency and time that you want (Menu |
Automation | Server T
asks).
Role-based
access
Restrict access to reports and report server settings by specifying Content
Securit
y Reporter permissions for each ePolicy Orchestrator permission set.
Log Sources Set up a variety of log sources from which to obtain report data, and specify the
columns you want to appear in the report, when you want the data to be
collected, and how you want the data to be processed.
1
Introduction
McAfee
Content Security Reporter features
8
McAfee Content Security Reporter 1.0.0 Software Product Guide
Page view 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 73 74

Comments to this Manuals

No comments