Cisco Cisco Content Security Management Appliance M390 User Guide

Page of 432
 
5-28
AsyncOS 9.5.2 for Cisco Content Security Management Appliances User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
  Web Reporting Page Descriptions
Presence of long, obfuscated End-User License Agreements (EULAs)
Global volume and changes in volume
Network owner information
History of a URL
Age of a URL
Presence on any block lists
Presence on any allow lists
URL typos of popular domains
Domain registrar information
IP address information
For more information on Web Reputation Filtering, see ‘Web Reputation Filters’ in the online help or 
user guide for your Web Security appliance.
From the Web Reputation Filters page, you can view the following information:
Tip
To customize your view of this report, see 
.
Table 5-10
Details on the Web > Reporting > Web Reputation Filters Page
Section
Description
Time Range (drop-down list)
A drop-down list that can range from a day to 90 days or a custom 
range. For more information on time ranges and customizing this 
for your needs, see th
Web Reputation Actions (Trend) 
This section, in graph format, displays the total number of web 
reputation actions (vertical) against the time specified (horizontal 
timeline). From this you can see potential trends over time for 
web reputation actions.
Web Reputation Actions (Volume) 
This section displays the web reputation action volume in 
percentages by transactions. 
Web Reputation Threat Types Blocked 
by WBRS 
This section displays the types of threats found in transactions 
that were blocked by Web Reputation filtering. 
Note: WBRS cannot always identify the threat type. 
Threat Types Detected in Other 
Transactions 
This section displays the type of threats found in transactions that 
were not blocked by Web Reputation filtering. 
Reasons these threats might not have been blocked include: 
Not all threats have a score that meets the threshold for 
blocking. However, other features of the appliance may catch 
these threats. 
Policies might be configured to allow threats to pass through.
Note: WBRS cannot always identify the threat type. 
Web Reputation Actions 
(Breakdown by Score) 
If Adaptive Scanning is not enabled, this interactive table 
displays the Web Reputation scores broken down for each action.