a) Choose “Zones...” from the “Configure” menu.
b) Hilight the names of the zones you want to check (see example below).
To quickly hilight all zones, select the “Check All...” radio button.
To deselect a zone name, hold down the Command Key.
 
Step 2: Select the reports you would like to receive.
a) Select “Reports...” from the Configure menu.
b) Choose the reports you want to receive by clicking in the box that
corresponds with the name of the report. (see sample below)
Definition of Reports:
General: Provides basic info e.g. number of servers per zone.
File Sharing: Provides a list of all servers in each zone
Guest Access: Provides a list of all servers with guest access enabled
including volume names
Possible Violations: Will search for potentially misconfigured servers as
well as specific file names if the “File List" report is
checked.
Password Crack: This report will check for easily guessed passwords.
File List: Provides a list of all files accessible on each volume. Since this
can be very large, it will export it to a separate file. Select with
caution.
Hint: You can also turn on Balloon Help using the icon in the upper right
corner of the window to get report descriptions.
 
Step 3: Select specific violations to search for (Optional):
a) Select “Violations to search for...” from the “Configure” menu.
(see example below)
b) To search for specific file names, add names to the scrolling list. You can
also delete names from the list by hilighting the name and hitting the
backspace or delete key.
c) To search for other possible violations, check the box immediately to the left
of each option on the bottom half of the window.
Hint: To change the list of file names to search for, select the “Default List” option. This will remove any custom entries you might have added though.
 
Step 4: Select output methods (Optional):
a) Select “Output...” from the “Configure” menu. (see example below)
b) To save reports to a text file select “Output Reports to Text File” and
designate which reports you want to have saved to text files by checking
the box to the left of the report name.
c) To receive reports via e-mail select “Mail Report” box. Fill in the “To” and
“Host” addresses and designate which reports you want to have saved to
text files by checking the box to the left of the report name..
Hint: To insure that the mail address information is correct, click the “Send Test
Message” button.
 
Step 5: Enter additional Password Crack Options (Optional):
a) Select “Password Crack...” from the “Configure” menu.
b) Type any username/password combinations you want
Network Security Guard to try during it's password crack
process.
Important!: Enter usernames and password EXACTLY as you want
to have them checked with no spaces and separated by a comma.
 
Step 6: Schedule a check (Optional):
a) Select "Schedule" from the configure menu.
b) Choose which scheduling feature you would like to run;
(Now is the default, to run the reports "Now" go direcly to the "Action"
Menu and choose "Execute A Security Check")
c) To schedule the reports to run one time, select "Single Time & Date". Then
enter the time and date in the appropiate boxes to the right of "Single Time
& Date".
d) OR To fully automate Network Security Guard, select
"On These Days/ Times". Choose the day or days you would like to run
the reports by clicking once on the day. Next, select the time by clicking
once on the hour you want the checks to begin. (note: AM is the top set of
numbers and PM is the bottom set of numbers) Finally, select the quarter
hour that the checks are to begin.
Important!: Due to the way Apple has implemented the AFP protocol, you must leave Network Security Guard running in the foreground of your Mac. We recommend installing it on an old SE class machine you probably have in a closet somewhere.
 
Step 7: Executing a check:
To execute a security check right away click the "Execute a Security Check" button in the "Configure: Reports" window, or by using the "Action" menu. To queue a check to run at a later time, click the "Run a Security Check Later" button from the "Action" menu. A progress window will automatically be displayed so that you can monitor the progress of the check.
Important!: Due to the way Apple has implemented the AFP protocol, you must leave Network Security Guard running in the foreground of your Mac. We recommend installing it on an old SE class machine you probably have in a closet somewhere.
Step 8: Viewing Reports:
a) After the reports have been compiled, you can view them by making a
selection from the "Report" menu.
b) To view exported files (if the “File List” report was checked), open the
resulting file in a word processor such as Microsoft Word or a database
program such as FileMaker Pro.
c) To view e-mail reports (if “Mail” report was checked), open the