Cisco Cisco Web Security Appliance S170 Guía Del Usuario
28-9
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 28 Common Tasks
Automating Log File Transfers
Step 10
Navigate to the Web Security Manager > Access Policies page.
Step 11
Click Add Policy.
Step 12
In the Policy Name field, enter a name for this policy, such as
MarketingPolicy
.
Step 13
In the Identities and Users field, choose “Select One or More Identities.”
Step 14
In the Identity field, select the Identity created in
Step 15
Under Authorized Users and Groups for the NTLM authentication realm, choose “Selected Groups and
Users” and then click the link next to “Groups.”
Users” and then click the link next to “Groups.”
Step 16
On the Access Policies: Policy “PolicyName”: Edit Groups page, add user groups to the Authorized
Groups section. You can do this using any of the following methods:
Groups section. You can do this using any of the following methods:
•
Select a user group in the directory search list window and either double-click or click Add.
•
Type the entire group name in the Directory Search window, and after the search is complete, click
Add. This allows you to enter groups that do not appear in the directory search list, such as groups
that belong to a trusted domain or groups that are not yet available in the directory.
Add. This allows you to enter groups that do not appear in the directory search list, such as groups
that belong to a trusted domain or groups that are not yet available in the directory.
Step 17
Click Done.
Step 18
Click Submit.
Step 19
through
using a different Access Policy name, such as
EngineeringPolicy
and
specifying different Active Directory user groups.
Step 20
On the Access Policies page, configure access control settings for each Access Policy as desired.
Step 21
Submit your changes.
Now, users from the set of users defined in
will have different Access Policies applied to them
than the users defined in
. Assuming you configure different access control settings for each
Access Policy, each set of users will observe different behavior when accessing the web.
Where to Find More Information
You can read the following sections for more detailed information on the steps included in this task:
•
•
Automating Log File Transfers
In this task, you will configure the appliance so it automatically transfers the access logs using SCP to
a remote server every day at noon and midnight. You might want to do this if you want each log file to
contain web access information for the same amount of time (12 hours).
a remote server every day at noon and midnight. You might want to do this if you want each log file to
contain web access information for the same amount of time (12 hours).
For example, you use a third party tool to analyze the web data in the access logs each day, and you want
each access log file to contain data for the exact same amount of time, 12 hours.
each access log file to contain data for the exact same amount of time, 12 hours.
This task assumes you have access to an SCP server, including the host name, directory, and username.
Step 1
Navigate to the System Administration > Log Subscriptions page.
Step 2
Click the “accesslogs” link under the Log Name column.