Cisco Cisco Web Security Appliance S190 Guía Del Usuario
23-8
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 23 Web Security Appliance Reports
Web Sites Page
Note
The client reports sometimes show a user with an asterisk (*) at the end of the username. For example,
the Client report might show an entry for both “jsmith” and “jsmith*”. Usernames listed with an asterisk
(*) indicate the username provided by the user, but not confirmed by the authentication server. This
happens when the authentication server was not available at the time and the appliance is configured to
permit traffic when authentication service is unavailable.
the Client report might show an entry for both “jsmith” and “jsmith*”. Usernames listed with an asterisk
(*) indicate the username provided by the user, but not confirmed by the authentication server. This
happens when the authentication server was not available at the time and the appliance is configured to
permit traffic when authentication service is unavailable.
Web Sites Page
The Reporting > Web Sites page is an overall aggregation of the activity that is happening on the Web
Security appliance. From this page you can monitor high-risk web sites accessed during a specific time
range.
Security appliance. From this page you can monitor high-risk web sites accessed during a specific time
range.
shows the Web Sites page:
Malware Threats Detected
From this table you can see the top malware threats that a specific
user is triggering. In the text field at the bottom of the Malware
Threats section, enter the malware threat name and click Find
Malware Threat. The name of the malware threat does not need
to be an exact match.
user is triggering. In the text field at the bottom of the Malware
Threats section, enter the malware threat name and click Find
Malware Threat. The name of the malware threat does not need
to be an exact match.
Policies Matched
From this section you can find a specific policy that is being
enforced on this particular user.
enforced on this particular user.
From this section you can also search for data that applies to a
specific policy in the Find Policy field. For more information,
see
specific policy in the Find Policy field. For more information,
see
Table 23-3
User > User Details Report Page Components (continued)
Section
Description