Cisco Cisco Content Security Management Appliance M390

Page of 26
6
I R O N P O R T   A S Y N C O S   6 . 4   R E P O R T I N G   A P I   F O R   I R O N P O R T   A P P L I A N C E S
R E P O R T I N G   D A T A   D E S C R I P T I O N S
The tables that follow describe the columns included in each of the .csv files available for 
download. The GUI page containing the export link to retrieve the .csv file is listed with each 
report below.
Table Keys
The keys for a table (if any) are identified using an asterisk (*).
Common Entries
The first four columns for all the tables are identical. These columns are described below
Incoming and Outgoing Mail Summary
Incoming Mail Summary
GUI Page containing 'Export' link: 'Overview.'
Table 1-1
Common Table Columns
Parameter Name
Description
Begin Timestamp
Seconds since the Unix Epoch at the beginning of the measurement 
interval.
End Timestamp
Seconds since the Unix Epoch at the end of the measurement interval.
Begin Date
The human readable time stamp at the beginning of the measurement 
interval.
End Date
The human readable time stamp at the end of the measurement 
interval.
Parameter Name
Description
Stopped by Reputation 
Filtering
Messages stopped by Reputation Filtering. This is calculated as: 
(Connections blocked by SBRS and HAT policies) * Multiplier + 
Recipients blocked by recipient throttling
Stopped as Invalid 
Recipients
Number of recipients rejected due to invalid recipients identified by 
conversational LDAP acceptance or RAT restrictions.
Spam Detected
Number of messages (recipients) identified as spam or suspect spam
Virus Detected
Number of messages (recipients) identified as virus positive
Stopped by Content Filters
Number of messages (recipients) that triggered at least one content 
filter with an action of drop, bounce, or quarantine