Cisco Cisco Content Security Management Appliance M390 Guía Del Usuario
5-20
AsyncOS 8.3 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
Step 2
In the Malware Categories interactive table, click on a category in the Malware Category column.
Step 3
To customize your view of this report, see
.
Malware Threat Report
The Malware Threat Report page shows clients at risk for a particular threat, displays a list of potentially
infected clients, and links to the Client Detail page. The trend graph at the top of the report shows
monitored and blocked transactions for a threat during the specified time range. The table at the bottom
shows the actual number of monitored and blocked transactions for a threat during the specified time
range.
infected clients, and links to the Client Detail page. The trend graph at the top of the report shows
monitored and blocked transactions for a threat during the specified time range. The table at the bottom
shows the actual number of monitored and blocked transactions for a threat during the specified time
range.
To view this report, click a category in the Malware Category column of the Anti-Malware report page.
For additional information, click the Support Portal Malware Details link below the table.
Note
You can generate a scheduled report for Top Malware Categories Detected and Top Malware Threats
Detected on the Anti-Malware page, but you cannot schedule a generated report from the Malware
Categories and Malware Threats Report Page. For information on scheduling a report, see the
Detected on the Anti-Malware page, but you cannot schedule a generated report from the Malware
Categories and Malware Threats Report Page. For information on scheduling a report, see the
Malware Category Descriptions
The Web Security appliance can block the following types of malware:
Malware Type
Description
Adware
Adware encompasses all software executables and plug-ins that direct users
towards products for sale. Some adware applications have separate processes
that run concurrently and monitor each other, ensuring that the modifications
are permanent. Some variants enable themselves to run each time the machine
is started. These programs may also change security settings making it
impossible for users to make changes to their browser search options, desktop,
and other system settings.
towards products for sale. Some adware applications have separate processes
that run concurrently and monitor each other, ensuring that the modifications
are permanent. Some variants enable themselves to run each time the machine
is started. These programs may also change security settings making it
impossible for users to make changes to their browser search options, desktop,
and other system settings.
Browser Helper Object
A browser helper object is browser plug-in that may perform a variety of
functions related to serving advertisements or hijacking user settings.
functions related to serving advertisements or hijacking user settings.
Commercial System
Monitor
Monitor
A commercial system monitor is a piece of software with system monitor
characteristics that can be obtained with a legitimate license through legal
means.
characteristics that can be obtained with a legitimate license through legal
means.
Dialer
A dialer is a program that utilizes your modem or another type of Internet
access to connect you to a phone line or a site that causes you to accrue long
distance charges to which you did not provide your full, meaningful, and
informed consent.
access to connect you to a phone line or a site that causes you to accrue long
distance charges to which you did not provide your full, meaningful, and
informed consent.
Generic Spyware
Spyware is a type of malware installed on computers that collects small pieces
of information about users without their knowledge.
of information about users without their knowledge.
Hijacker
A hijacker modifies system settings or any unwanted changes to a user’s system
that may direct them to a website or run a program without a user’s full,
meaningful, and informed consent.
that may direct them to a website or run a program without a user’s full,
meaningful, and informed consent.