Cisco Cisco Content Security Management Appliance M1070 User Guide
5-6
AsyncOS 9.6 for Cisco Content Security Management Appliances User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
Table 5-1
Web Reporting Tab Details
Web Reporting Menu
Action
The Overview page provides a synopsis of the activity on your Web Security
appliances. It includes graphs and summary tables for the incoming and
outgoing transactions. For more information, see the
appliances. It includes graphs and summary tables for the incoming and
outgoing transactions. For more information, see the
.
The Users page provides several web tracking links that allow you to view
web tracking information for individual users.
web tracking information for individual users.
From the Users page you can view how long a user, or users, on your system
have spent on the internet, on a particular site or URL, and how much
bandwidth that user is using.
have spent on the internet, on a particular site or URL, and how much
bandwidth that user is using.
From the Users page you can click on an individual user in the interactive
Users table to view more details for that specific user on the User Details page.
Users table to view more details for that specific user on the User Details page.
The User Details page allows you to see specific information about a user that
you have identified in the Users table on the Web > Reporting > Users page.
From this page you can investigate individual user’s activity on your system.
This page is particularly useful if you are running user-level investigations
and need to find out, for example, what sites your users are visiting, what
Malware threats they are encountering, what URL categories they are
accessing, and how much time a specific user is spending at these sites.
you have identified in the Users table on the Web > Reporting > Users page.
From this page you can investigate individual user’s activity on your system.
This page is particularly useful if you are running user-level investigations
and need to find out, for example, what sites your users are visiting, what
Malware threats they are encountering, what URL categories they are
accessing, and how much time a specific user is spending at these sites.
For more information, see the
. For
information on a specific user in your system, see the
The Web Sites page allows you to view an overall aggregation of the activity
that is happening on your managed appliances. From this page you can
monitor high-risk web sites accessed during a specific time range. For more
information, see the
that is happening on your managed appliances. From this page you can
monitor high-risk web sites accessed during a specific time range. For more
information, see the
.
The URL Categories page allows you to view the top URL Categories that are
being visited, including:
being visited, including:
•
the top URLs that have triggered a block or warning action to occur per
transaction.
transaction.
•
all the URL categories during a specified time range for both completed,
warned and blocked transactions. This is an interactive table with
interactive column headings that you can use to sort data as you need.
warned and blocked transactions. This is an interactive table with
interactive column headings that you can use to sort data as you need.
For more information, see the
The Application Visibility page allows you to apply and view the controls that
have been applied to a particular application types within the Security
Management appliance and Web Security appliance. For more information,
see the
have been applied to a particular application types within the Security
Management appliance and Web Security appliance. For more information,
see the
.
The Anti-Malware page allows you to view information about malware ports
and malware sites that the anti-malware scanning engine(s) detected during
the specified time range. The upper part of the report displays the number of
connections for each of the top malware ports and web sites. The lower part
of the report displays malware ports and sites detected. For more information,
see the
and malware sites that the anti-malware scanning engine(s) detected during
the specified time range. The upper part of the report displays the number of
connections for each of the top malware ports and web sites. The lower part
of the report displays malware ports and sites detected. For more information,
see the
.