Cisco Cisco Content Security Management Appliance M160 User Guide
4-73
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
Chapter 4 Using Centralized Web Reporting
From the Reports by User Location page, you can view the following
information:
information:
From the Reports by User Location page you can generate reports showing the
activity of local and remote users. This allows you to easily compare local and
remote activities of your users.
activity of local and remote users. This allows you to easily compare local and
remote activities of your users.
Note
You can generate a scheduled report for information on the Reports by User
Location page. For information on scheduling a report, see the
Location page. For information on scheduling a report, see the
Table 4-17
Details on the Web > Reporting > Reports by User Location Page
Section
Description
Time Range (drop-down list)
A drop-down list that can range from a day to 90 days or a custom
range. For more information on time ranges and customizing this
for your needs, see the
range. For more information on time ranges and customizing this
for your needs, see the
Total Web Proxy Activity: Remote Users
This section displays, in graph format, the activity of your remote
users (vertical) over the specified time (horizontal).
users (vertical) over the specified time (horizontal).
Web Proxy Summary
This section displays a summary of the activities of the local and
remote users on your system.
remote users on your system.
Total Web Proxy Activity: Local Users
This section displays, in graph format, the activity of your remote
users (vertical) over the specified time (horizontal).
users (vertical) over the specified time (horizontal).
Suspect Transactions Detected: Remote
Users
Users
This section displays, in graph format, the suspect transactions
that have been detected due to access policies that you have
defined for your remote users (vertical) over the specified time
(horizontal).
that have been detected due to access policies that you have
defined for your remote users (vertical) over the specified time
(horizontal).
Suspect Transactions Summary
This section displays a summary of suspected transactions of the
remote users on your system.
remote users on your system.
Suspect Transactions Detected: Local
Users
Users
This section displays, in graph format, the suspect transactions
that have been detected due to access policies that you have
defined for your remote users (vertical) over the specified time
(horizontal).
that have been detected due to access policies that you have
defined for your remote users (vertical) over the specified time
(horizontal).
Suspect Transactions Summary
This section displays a summary of suspected transactions of the
local users on your system.
local users on your system.