Cisco Cisco Web Security Appliance S390 Betriebsanweisung

Seite von 784
 
12-27
Cisco IronPort AsyncOS 7.0 for Web User Guide
OL-23079-01
Chapter 12      Data Security and External DLP Policies
Logging
Figure 12-8
Scanning Destinations Settings for External DLP Policies
Step 4
In the Destination to scan section, choose one of the following options:
  –
Do not scan any uploads. No upload requests are sent to the configured 
DLP system(s) for scanning. All upload requests are evaluated against 
the Access Policies.
  –
Scan all uploads. All upload requests are sent to the configured DLP 
system(s) for scanning. The upload request is blocked or evaluated 
against the Access Policies depending on the DLP system scanning 
verdict.
  –
Scan uploads to specified custom URL categories only. Upload 
requests that fall in specific custom URL categories are sent to the 
configured DLP system for scanning. The upload request is blocked or 
evaluated against the Access Policies depending on the DLP system 
scanning verdict. Click Edit custom categories list to select the URL 
categories to scan.
Step 5
Submit and commit your changes.
Logging
The access logs indicate whether or not an upload request was scanned by either 
the IronPort Data Security Filters or an external DLP server. The access log 
entries include a field for the IronPort Data Security scan verdict and another field 
for the External DLP scan verdict based. For more information, see 
In addition to the access logs, the Web Security appliance provides the following 
log file types to troubleshoot IronPort Data Security and External DLP Policies: