Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
5-22
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Note
From Client Malware Risk Details table: The client reports sometimes show a user with an asterisk (*)
at the end of the user name. For example, the Client report might show an entry for both “jsmith” and
“jsmith*”. User names listed with an asterisk (*) indicate the user name provided by the user, but not
confirmed by the authentication server. This happens when the authentication server was not available
at the time and the appliance is configured to permit traffic when authentication service is unavailable.
at the end of the user name. For example, the Client report might show an entry for both “jsmith” and
“jsmith*”. User names listed with an asterisk (*) indicate the user name provided by the user, but not
confirmed by the authentication server. This happens when the authentication server was not available
at the time and the appliance is configured to permit traffic when authentication service is unavailable.
To view an example of how the User Details page may be used, see
Web Sites Report
The Web > Reporting > Web Sites page is an overall aggregation of the activity that is happening on
the managed appliances. From this page you can monitor high-risk web sites accessed during a specific
time range.
the managed appliances. From this page you can monitor high-risk web sites accessed during a specific
time range.
Malware Threats Detected
From this table you can see the top Malware threats that a specific
user is triggering.
user is triggering.
You can search for data on a specific malware threat name in the
Find Malware Threat field. Enter the Malware Threat name and
click Find Malware Threat. The name of the Malware Threat does
not need to be an exact match.
Find Malware Threat field. Enter the Malware Threat name and
click Find Malware Threat. The name of the Malware Threat does
not need to be an exact match.
Policies Matched
From this section you can find the policy groups that applied to
this user when accessing the web.
this user when accessing the web.
In the text field at the bottom of the section enter the policy name
and click Find Policy. The name of the policy does not need to
be an exact match.
and click Find Policy. The name of the policy does not need to
be an exact match.
Table 5-6
Details on the Web > Reporting > User > User Details Page
Section
Description