Cisco Cisco Content Security Management Appliance M390
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
4
I R O N P O R T A S Y N C O S 6 . 4 R E P O R T I N G A P I F O R I R O N P O R T A P P L I A N C E S
Keys
Exports also include the report table key(s), even in cases where the keys are not visible in the
report. In cases where a key is shown, the display name shown in the report is used as the
column header. Otherwise, a column header such as “key0,” “key1,” etc. is shown.
report. In cases where a key is shown, the display name shown in the report is used as the
column header. Otherwise, a column header such as “key0,” “key1,” etc. is shown.
Streaming
Most exports stream their data back to the client because the amount of data is potentially
very large. However, some exports return the entire result set rather than streaming data. This
is typically the case when report data is aggregated with non report data (e.g. Virus Outbreaks
Detail.)
very large. However, some exports return the entire result set rather than streaming data. This
is typically the case when report data is aggregated with non report data (e.g. Virus Outbreaks
Detail.)