Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario

Descargar
Página de 441
 
5-54
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 5      Using Centralized Web Reporting and Tracking
Figure 5-16
Web Tracking Search Results (Proxy Services Tab) 
In the Results window, you can view the following:
  •
The time the URL was accessed
  •
The website involved in the transaction 
  •
The number of related transactions spawned by the user-initiated transaction, such as images loaded, 
javascripts run, and secondary sites accessed. This number appears in parentheses below the 
“Display Details” link in the column heading. 
  •
The disposition (The result of the transaction. If applicable, shows the reason the transaction was 
blocked, monitored, or warned.) 
  •
Bandwidth of the transaction 
  •
User ID/Client IP address 
Step 6
To view more information about the transactions, click the Display Details... link in the Website column 
heading.
Note
If you need to view more than 1000 results, click the Printable Download link to obtain a CSV 
file that includes the complete set of raw data, excluding details of related transactions. 
Tip
If a URL in the results is truncated, you can determine the full URL by noting which host Web 
Security appliance processed the transaction, then checking the Accesslog on that appliance. 
To view a list of up to 500 related transactions, click the Related Transactions link. 
Searching for Transactions Processed by the L4 Traffic Monitor 
The L4 Traffic Monitor tab on the Web > Reporting > Web Tracking page provides details about 
connections to malware sites and ports. You can search for connections to malware sites by the following 
types of information: 
  •
Time range 
  •
Site, using IP address or domain 
  •
Port