Cisco Cisco Web Security Appliance S670 User Guide

Page of 606
 
23-4
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 23      Web Security Appliance Reports
Overview Page
 describes the information on the Overview page. 
Table 23-1
Overview Report Page Components 
Section
Description
Time Range (drop-down list)
A menu that allows to choose the time range of the data 
contained in the report. For more information, see the 
Total Web Proxy Activity
This section displays the Web Proxy activity. This section 
displays the actual number of transactions (vertical scale) as 
well as the approximate date that the activity occurred 
(horizontal timeline).
Web Proxy Summary
This section allows you to view the percentage of Web Proxy 
activity that are suspect, or clean Web Proxy activity, 
including the total number of transactions.
L4 Traffic Monitor Summary
This section reports on traffic monitored and blocked by the 
L4 Traffic Monitor.
Suspect Transactions
This section allows you to view the web transactions that have 
been labeled as suspect by the various security components. 
This section displays the actual number of transactions 
(vertical scale) as well as the approximate date that the 
activity occurred (horizontal timeline).
Suspect Transactions Summary
This section allows you to view the percentage of blocked or 
warned transactions that are suspect. Additionally, you can 
see the type of transactions that have been detected and 
blocked, and the actual number of times that this transaction 
was blocked.
Top URL Categories by Total Transactions
This section displays the top 10 URL categories that have 
been blocked. (URL category on the vertical scale by the 
number of times requests in that category were blocked on the 
horizontal scale.) 
The set of predefined URL categories is occasionally updated. 
For more information about the impact of these updates on 
report results, see 
.
Top Application Types by Total Transactions
This section displays the top application types that have been 
blocked by the AVC engine. (The application type on the 
vertical scale by the number of times requests for applications 
in that type were blocked on the horizontal scale.) 
Top Malware Categories Detected
This section displays all malware categories that have been 
detected.
Top Users Blocked or Warned Transactions
This section displays the users that are generating the blocked 
or warned transactions. Authenticated users are displayed 
username and unauthenticated users are displayed by IP 
address. 
You can choose to make usernames unrecognizable in reports. 
For more information on how to do this, see th