13.07.2015 Views

TRITON - Web Security Help, Version 7.7 - Websense

TRITON - Web Security Help, Version 7.7 - Websense

TRITON - Web Security Help, Version 7.7 - Websense

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Reporting AdministrationInformation about whether or not user names and IP addresses are logged is storedcentrally, so the same settings are used throughout your deployment.Likewise, any changes you make to how categories are logged are shared by allFiltering Service and Log Server instances.If your environment includes both multiple Policy Servers and multiple Log Servers,make sure you log on to each Policy Server separately, and verify that it iscommunicating with the correct Log Server.1. Enter the Log Server IPv4 address or hostname.2. Enter the Port that Filtering Service uses to send log records to Log Server(55805, by default).3. (<strong>Web</strong>sense <strong>Web</strong> <strong>Security</strong> Gateway Anywhere) Enter the port that Sync Serviceuses to send log records from the hybrid service to Log Server.4. Click Check Status to determine whether <strong>TRITON</strong> - <strong>Web</strong> <strong>Security</strong> is able tocommunicate with Log Server using the specified location and port.A message indicates whether the connection test passed. Update the IP address orhostname and port, if needed, until the test is successful.5. Specify how much user data is stored in log records and displayed in reports:• To log identifying information for machines accessing the Internet, mark LogIP addresses.• To log identifying information for users accessing the Internet, mark Loguser names.NoteIf you do not log IP addresses or user names, there can beno user data in your reports. This is sometimes calledanonymous logging.• If you are using <strong>Web</strong> <strong>Security</strong> Gateway or Gateway Anywhere, and wantThreats dashboard tables to include source device name information, whenavailable, click Log hostnames.Name information is available in threat-related logs only. It is not availablefor Internet activity to which no severity is assigned.6. Use the Selective Category Logging list to indicate any URL categories thatshould not be logged. Changes made here apply to all category filters in all activepolicies.NoteIf you disable logging for categories that have usage alertsset up (see Configuring category usage alerts, page 392),no usage alerts can be sent.Reports cannot include information about categories thatare not logged.<strong>TRITON</strong> - <strong>Web</strong> <strong>Security</strong> <strong>Help</strong> 411

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!