Cisco Cisco Content Security Management Appliance M380 Notas de publicación
2
Release Notes for Cisco IronPort AsyncOS 7.8 for Security Management
What’s New in Cisco IronPort AsyncOS 7.8 for Security Management
In addition, see the New Features list in the Release Notes for Cisco IronPort AsyncOS 7.5 for Web
Security at
Security at
.
Table 1
New Features for AsyncOS 7.8 for Security Management
Feature
Description
New Features:
Support for new
Web Security
features
Web Security
features
A new Configuration Master 7.5 supports new features in Cisco IronPort
AsyncOS 7.5 for Web Security, including:
AsyncOS 7.5 for Web Security, including:
•
Transparent User Identification for Microsoft Active Directory
•
Adaptive Scanning (automatic selection of the most effective anti-malware tool
for the situation)
for the situation)
•
Automatic updates to the set of URL categories used with Cisco IronPort Web
Usage Controls
Usage Controls
For information about these features, see the Release Notes for Cisco IronPort
AsyncOS 7.5 for Web Security. You will configure these features in the new
Configuration Master the same way that you configure them in the Web Security
appliance.
AsyncOS 7.5 for Web Security. You will configure these features in the new
Configuration Master the same way that you configure them in the Web Security
appliance.
User preferences
Each user of the Security Management appliance can now specify language, landing
page, and default report settings for time range and number of table rows to display.
page, and default report settings for time range and number of table rows to display.
Log rollover at
specified time
specified time
You can now specify a time for logs to roll over.
Enhancements:
Enhanced:
L4 Traffic
Monitor
reporting and
tracking
Monitor
reporting and
tracking
These enhancements improve your ability to determine whether blocking a site or a
port is the more effective solution to a particular malware problem, or whether to
take action specific to a particular client IP address that is at unusually high risk.
port is the more effective solution to a particular malware problem, or whether to
take action specific to a particular client IP address that is at unusually high risk.
•
You can view a list of top client IP addresses accessing malware sites, and filter
these results by port.
these results by port.
•
You can filter top malware sites by port.
•
You can click the data in a table in the report to view details for a suspect site,
port, or client IP address.
port, or client IP address.
•
You can perform multi-dimensional searches for malware risk areas, for
example by hostname and port.
example by hostname and port.
Enhanced:
Backups
•
You can now schedule multiple future backups and recurring backups at times
and intervals that you choose.
and intervals that you choose.
•
You can back up just the features that you specify.
•
Backup information is now logged separately in a Backup Log to make it easier
to locate, and backup start and end times are now logged.
to locate, and backup start and end times are now logged.
Enhanced:
Warning for
triggers of proxy
restart
triggers of proxy
restart
When you publish configuration changes that will cause a Web Security proxy
server restart, thus interrupting service to end-users, you now see a warning so that
you can choose to make this change at a time of lower impact.
server restart, thus interrupting service to end-users, you now see a warning so that
you can choose to make this change at a time of lower impact.