Cisco Cisco Content Security Management Appliance M1070 User Guide
5-7
AsyncOS 8.3.7 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
There are three reporting pages showing file reputation and analysis data.
For more information, see the
.
The Client Malware Risk page is a security-related reporting page that can be
used to identify individual client computers that may be connecting unusually
frequently to malware sites.
used to identify individual client computers that may be connecting unusually
frequently to malware sites.
For more information, see the
.
Allows you to view reporting on Web Reputation filtering for transactions
during a specified time range. For more information, see the
during a specified time range. For more information, see the
Allows you to view information about malware ports and malware sites that
the L4 Traffic Monitor detected during the specified time range. For more
information, see the
the L4 Traffic Monitor detected during the specified time range. For more
information, see the
Allows you to view data for SOCKS proxy transactions, including
destinations and users.
destinations and users.
For more information, see the
.
The Reports by User Location page allows you to find out what activities that
your mobile users are conducting from their local or remote systems.
your mobile users are conducting from their local or remote systems.
For more information, see the
.
The Web Tracking page allows you to search for the following types of
information:
information:
•
allows you
to track and see basic web-related information such as the type of web
traffic that is being handled by the appliances.
traffic that is being handled by the appliances.
This includes information such as time ranges, and UserID and Client IP
addresses, but also includes information like certain types of URLs, how
much bandwidth that each connection is taking up, or tracking a specific
user’s web usage.
addresses, but also includes information like certain types of URLs, how
much bandwidth that each connection is taking up, or tracking a specific
user’s web usage.
•
allows
you to search your L4TM data for sites, ports, and client IP addresses
involved in malware transfer activity.
involved in malware transfer activity.
•
allows you to
search for transactions processed by the SOCKS proxy.
For more information, see the
Allows you to view the overall workload that is sending reporting data to the
Security Management appliance.
Security Management appliance.
For more information, see the
.
Allows you to get a glimpse of the impact of the reporting data on the Security
Management appliance for each appliance. For more information, see the
Management appliance for each appliance. For more information, see the
Table 5-1
Web Reporting Tab Details
Web Reporting Menu
Action