Cisco Cisco Content Security Management Appliance M390 Guía Del Usuario
5-28
AsyncOS 8.3.6 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
Tip
To customize your view of this report, see
.
Related Topics
•
SOCKS Proxy Report
The Web > Reporting > SOCKS Proxy Page allows you to view data and trends for transactions
processed through the SOCKS proxy, including information about destinations and users.
processed through the SOCKS proxy, including information about destinations and users.
Note
The destination shown in the report is the address that the SOCKS client (typically a browser) sends to
the SOCKS proxy.
the SOCKS proxy.
To change SOCKS policy settings, see the online help or user guide for your Web Security appliance.
Related Topics
•
Malware Ports
This table displays the ports on which the L4 Traffic Monitor has
most frequently detected malware.
most frequently detected malware.
To view details, click an entry in the table. For example, click the
number of Total Malware Connections Detected to view details of
each connection on that port. The list is displayed as search
results in the L4 Traffic Monitor tab on the Web > Reporting >
Web Tracking page. For more information about this list, see
number of Total Malware Connections Detected to view details of
each connection on that port. The list is displayed as search
results in the L4 Traffic Monitor tab on the Web > Reporting >
Web Tracking page. For more information about this list, see
.
Malware Sites Detected
This table displays the domains on which the L4 Traffic Monitor
most frequently detects malware.
most frequently detects malware.
To include only data for a particular port, enter a port number into
the box at the bottom of the table and click Filter by Port. You can
use this feature to help determine whether to block a site or a port.
the box at the bottom of the table and click Filter by Port. You can
use this feature to help determine whether to block a site or a port.
To view details, click an entry in the table. For example, click the
number of Malware Connections Blocked to view the list of each
blocked connection for a particular site. The list is displayed as
search results in the L4 Traffic Monitor tab on the Web >
Reporting > Web Tracking page. For more information about this
list, see
number of Malware Connections Blocked to view the list of each
blocked connection for a particular site. The list is displayed as
search results in the L4 Traffic Monitor tab on the Web >
Reporting > Web Tracking page. For more information about this
list, see
.
Table 5-11
L4 Traffic Monitor Report Page Components (continued)
Section
Description