Cisco Cisco Web Security Appliance S190 Guía Del Usuario
18-8
Cisco AsyncOS for Web User Guide
Chapter 18 Web Security Appliance Reports
SOCKS Proxy Page
SOCKS Proxy Page
The Reporting > SOCKS Proxy Page allows you to view data and trends for transactions processed
through the SOCKS proxy, including information about top destinations and users.
through the SOCKS proxy, including information about top destinations and users.
Reports by User Location Page
The Reporting > Reports by User Location page allows you to find out what activities your local and
remote users are conducting.
remote users are conducting.
Activities include:
•
URL categories that are being accessed by the local and remote users.
•
Anti-Malware activity that is being triggered by sites the local and remote users are accessing.
•
Web Reputation of the sites being accessed by the local and remote users.
•
Applications that are being accessed by the local and remote users.
•
Users (local and remote).
•
Domains accessed by local and remote users.
Web Tracking Page
Use the Web Tracking page to search for and get details about individual transactions or patterns of
transactions that may be of concern. Depending on your needs, search in one or both of the following
tabs:
transactions that may be of concern. Depending on your needs, search in one or both of the following
tabs:
Section
Description
Time Range (drop-down list)
A menu that allows to choose the time range of the data contained
in the report.
in the report.
Total Web Proxy Activity: Remote
Users
Users
Displays the activity of your remote users (vertical) over the
specified time (horizontal).
specified time (horizontal).
Web Proxy Summary
Displays a summary of the activities of the local and remote users
on the network.
on the network.
Total Web Proxy Activity: Local
Users
Users
Displays the activity of your remote users (vertical) over the
specified time (horizontal).
specified time (horizontal).
Suspect Transactions Detected:
Remote Users
Remote Users
Displays the suspect transactions that have been detected due to
Access Policies defined for remote users (vertical) over the
specified time (horizontal).
Access Policies defined for remote users (vertical) over the
specified time (horizontal).
Suspect Transactions Summary
Displays a summary of suspected transactions of the remote users
on the network.
on the network.
Suspect Transactions Detected:
Local Users
Local Users
Displays the suspect transactions that have been detected due to
Access Policies defined for your remote users (vertical) over the
specified time (horizontal).
Access Policies defined for your remote users (vertical) over the
specified time (horizontal).
Suspect Transactions Summary
Displays a summary of suspected transactions of the local users
on the network.
on the network.