Cisco Cisco Email Security Appliance C390 사용자 가이드

다운로드
페이지 418
2-11
Cisco IronPort AsyncOS 7.3 for Email Daily Management Guide
OL-23080-01
Chapter 2      Using Email Security Monitor
Email Security Monitor Pages
Note
Information for messages present in the work queue when the appliance is 
rebooted is not reported by the Email Security Monitor feature.
Email Security Monitor and Centralized Management
In this version of AsyncOS, you cannot aggregate Email Security Monitor reports 
of clustered Cisco IronPort appliances. All reports are restricted to machine level. 
This means they cannot be run at the group or cluster levels — only on individual 
machines.
The same is true of the Archived Reports page — each machine in effect has its 
own archive. Thus, the “Generate Report” feature runs on the selected machine.
The Scheduled Reports page is not restricted to machine level; therefore, settings 
can be shared across multiple machines. Individual scheduled reports run at 
machine level just like interactive reports, so if you configure your scheduled 
reports at cluster level, every machine in the cluster will send its own report.
The “Preview This Report” button always runs against the login-host.
Email Security Monitor Pages
The Email Security Monitor feature is the first page displayed after you access the 
GUI. To view the Email Security Monitor feature, access the GUI. (See the 
“Overview” chapter in the Cisco IronPort AsyncOS for Email Configuration 
Guide
.) The Overview page on the Monitor menu is displayed. If you have 
completed the System Setup Wizard (or the CLI 
systemsetup
 command) and 
committed the changes, at least one public listener should already be configured 
to accept email on your appliance. If the appliance is accepting email, the 
Overview page will be populated with data.
The Email Security Monitor feature is comprised of all the pages available on the 
Monitor menu except the Quarantines pages. 
You use these pages in the GUI to monitor domains that are connecting to the 
Cisco IronPort appliance’s listeners. You can monitor, sort, analyze, and classify 
the “mail flow” of your appliance and differentiate between high-volume senders 
of legitimate mail and potential “spammers” (senders of high-volume, unsolicited