Cisco Cisco Email Security Appliance X1070 User Guide
29-23
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
Chapter 29 Using Email Security Monitor
Email Security Monitor Pages
–
A list of all the rewritten URLs (malicious and unmalicious). Click on a URL to view a detailed
report.
report.
–
Action taken (allow, block, or unknown) when a rewritten URL was clicked.
Note that, if the verdict of a URL (clean or malicious) was unknown at the time when the end
user clicked it, the status is shown as unknown. This could be because the URL was under
further scrutiny or the web server was down or not reachable at the time of the user click.
user clicked it, the status is shown as unknown. This could be because the URL was under
further scrutiny or the web server was down or not reachable at the time of the user click.
–
The number of times end users clicked on a rewritten URL. Click on a number to view a list of
all the messages that contain the clicked URL.
all the messages that contain the clicked URL.
•
While using Web Interaction Tracking reports, keep in mind the following limitations:
–
If you have configured a content or message filter to deliver messages after rewriting malicious
URLs and notify another user (for example, an administrator), the web interaction tracking data
of the original recipient is incremented even if the notified user clicks on the rewritten URLs.
URLs and notify another user (for example, an administrator), the web interaction tracking data
of the original recipient is incremented even if the notified user clicks on the rewritten URLs.
–
If you are sending a copy of quarantined messages containing rewritten URLs to a user (for
example, an administrator) using web interface, the web interaction tracking data of the original
recipient is incremented even if the user (to whom the copy of the messages were sent) clicks
on the rewritten URLs.
example, an administrator) using web interface, the web interaction tracking data of the original
recipient is incremented even if the user (to whom the copy of the messages were sent) clicks
on the rewritten URLs.
–
At any point, if you plan to modify the time of your appliance, make sure that the system time
is synchronized with Coordinated Universal Time (UTC).
is synchronized with Coordinated Universal Time (UTC).
Forged Email Matches Report
See
.
File Reputation and File Analysis Reports
For the following reports, see
:
•
Advanced Malware Protection
•
File Analysis
•
AMP Verdict Updates
Mailbox Auto Remediation Report
You can view the details of the mailbox remediation results using the Mailbox Auto Remediation report
page (Monitor > Mailbox Auto Remediation). Use this report to view details such as:
page (Monitor > Mailbox Auto Remediation). Use this report to view details such as:
•
A list of recipients for whom the mailbox remediation was successful or unsuccessful
•
Remedial actions taken on messages
•
The filenames associated with a SHA-256 hash
Click on a SHA-256 hash to view the related messages in Message Tracking.
For more information, see