Cisco Cisco Web Security Appliance S190 Guía Del Usuario
O V E R V I E W P A G E
C H A P T E R 1 8 : M O N I T O R I N G
399
O V E R V I E W PA G E
The Monitor > Overview page displays the Overview report. This report contains highlights of
the System Status report and provides summary system traffic and security risk summary data.
the System Status report and provides summary system traffic and security risk summary data.
The following sections appear on the Overview report:
Export links that are visible on each page, are used to export raw data. For more information,
see “Exporting Report Data” on page 419.
see “Exporting Report Data” on page 419.
Overview Report Section
Description
System Overview
Displays the following information:
• Web Proxy traffic characteristics, including per-minute data
• Web Proxy traffic characteristics, including per-minute data
averages for client transactions, system bandwidth, average
system response time, and total current connections.
system response time, and total current connections.
• System resource utilization statistics.
Use the System Status Details link to access the full System
Status report.
Use the System Status Details link to access the full System
Status report.
Total Web Activity
Compares total clean transactions and total suspect
transactions in a trend graph over time. Suspect transactions
include all monitored and blocked transactions.
transactions in a trend graph over time. Suspect transactions
include all monitored and blocked transactions.
Suspect Transactions
Detected
Detected
Compares various types of suspect transactions in a trend
graph over time.
graph over time.
Security Services Summary
Displays the following information:
• Web Proxy total suspect transactions and suspect
• Web Proxy total suspect transactions and suspect
transactions by type. Suspect transactions include requests
blocked URL category, requests blocked by Web
Reputation Filters, transactions detected by Anti-Malware
scanning, and other blocked transactions. “Other blocked
transactions” includes transactions blocked by various
policy settings such as the file size limit.
blocked URL category, requests blocked by Web
Reputation Filters, transactions detected by Anti-Malware
scanning, and other blocked transactions. “Other blocked
transactions” includes transactions blocked by various
policy settings such as the file size limit.
• L4 Traffic Monitor suspect connections. For information
about the specific monitored and blocked transactions, see
“L4 Traffic Monitor Data Page” on page 400.
“L4 Traffic Monitor Data Page” on page 400.
Top URL Categories
Lists the top 10 URL categories matched for the specified time
range. For more information, see “URL Categories Page” on
page 404.
range. For more information, see “URL Categories Page” on
page 404.
Top Malware Categories
Lists the top 10 malware categories detected for the specified
time range. For more information, see “Anti-Malware Page”
on page 403.
time range. For more information, see “Anti-Malware Page”
on page 403.