Cisco Cisco Web Security Appliance S670 User Guide
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
23-4
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 23 Web Security Appliance Reports
Overview Page
describes the information on the Overview page.
Table 23-1
Overview Report Page Components
Section
Description
Time Range (drop-down list)
A menu that allows to choose the time range of the data
contained in the report. For more information, see the
contained in the report. For more information, see the
Total Web Proxy Activity
This section displays the Web Proxy activity. This section
displays the actual number of transactions (vertical scale) as
well as the approximate date that the activity occurred
(horizontal timeline).
displays the actual number of transactions (vertical scale) as
well as the approximate date that the activity occurred
(horizontal timeline).
Web Proxy Summary
This section allows you to view the percentage of Web Proxy
activity that are suspect, or clean Web Proxy activity,
including the total number of transactions.
activity that are suspect, or clean Web Proxy activity,
including the total number of transactions.
L4 Traffic Monitor Summary
This section reports on traffic monitored and blocked by the
L4 Traffic Monitor.
L4 Traffic Monitor.
Suspect Transactions
This section allows you to view the web transactions that have
been labeled as suspect by the various security components.
been labeled as suspect by the various security components.
This section displays the actual number of transactions
(vertical scale) as well as the approximate date that the
activity occurred (horizontal timeline).
(vertical scale) as well as the approximate date that the
activity occurred (horizontal timeline).
Suspect Transactions Summary
This section allows you to view the percentage of blocked or
warned transactions that are suspect. Additionally, you can
see the type of transactions that have been detected and
blocked, and the actual number of times that this transaction
was blocked.
warned transactions that are suspect. Additionally, you can
see the type of transactions that have been detected and
blocked, and the actual number of times that this transaction
was blocked.
Top URL Categories by Total Transactions
This section displays the top 10 URL categories that have
been blocked. (URL category on the vertical scale by the
number of times requests in that category were blocked on the
horizontal scale.)
been blocked. (URL category on the vertical scale by the
number of times requests in that category were blocked on the
horizontal scale.)
The set of predefined URL categories is occasionally updated.
For more information about the impact of these updates on
report results, see
For more information about the impact of these updates on
report results, see
.
Top Application Types by Total Transactions
This section displays the top application types that have been
blocked by the AVC engine. (The application type on the
vertical scale by the number of times requests for applications
in that type were blocked on the horizontal scale.)
blocked by the AVC engine. (The application type on the
vertical scale by the number of times requests for applications
in that type were blocked on the horizontal scale.)
Top Malware Categories Detected
This section displays all malware categories that have been
detected.
detected.
Top Users Blocked or Warned Transactions
This section displays the users that are generating the blocked
or warned transactions. Authenticated users are displayed
username and unauthenticated users are displayed by IP
address.
or warned transactions. Authenticated users are displayed
username and unauthenticated users are displayed by IP
address.
You can choose to make usernames unrecognizable in reports.
For more information on how to do this, see the
For more information on how to do this, see the