Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario

Descargar
Página de 590
 
Chapter 1      Setup and Installation
1-20
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
  –
CPU Utilization: percentage of CPU capacity used by each monitoring 
service
  –
System Version Information: model number, AsyncOS version, build 
date, installation date, and serial number
For more information about the System Status page, see 
Tabs on the System Status Page
The following tabs are available to administrator and operator users on the System 
Status Page: 
  •
Management Appliance tab: Centralized Services (System Status; Security 
Appliances; Email: Spam Quarantine, Centralized Reporting, Centralized 
Message Tracking; Web: Centralized Web Reporting, Centralized 
Configuration Manager), Network (IP Interfaces; SMTP Routes; DNS; 
Routing), System Administration (Users; User Roles; Alerts; Log 
Subscriptions; Return Addresses; LDAP; Disk Management; 
Shutdown/Reboot; Configuration File; System Upgrade; System Time: Time 
Zone, Time Settings; Feature Keys: Feature Key Settings, Feature Keys, 
Update Settings; System Setup: System Setup Wizard, Next Steps)
  •
Email tab: Reporting (Overview; Incoming Mail; Outgoing Destinations; 
Outgoing Senders; Internal Users; DLP Incidents; Content Filters; Virus 
Types; TLS Connections; Virus Outbreaks; System Capacity; Reporting Data 
Availability; Scheduled Reports; Archived Reports), Message Tracking 
(Message Tracking; Message Tracking Data Availability), Message 
Quarantine (Spam Quarantine)
  •
Web tab: Reporting (Overview: Users; Web Sites; URL Categories; 
ApplicationVisibility; Security: Anti-Malware; Client Malware Risk, Web 
Reputation Filters; L4 Traffic Monitor; Reporting by User Location; 
Reporting Services: Web Tracking; System Capacity; Data Availability; 
Scheduled Reports, Archieved Reports), Utilities (Web Appliance Status; 
Security Services Display; Configuration Masters; Publish: Publish to Web 
Appliances, Publish History), Configuration Master 5.7 (Web Security 
Manager: Identities, Decryption Policies, Routing Policies, Access Policies, 
Proxy Bypass, Custom URL Categories, Time Ranges), Configuration Master 
6.3 (Web Security Manager: Identities, Decryption Policies, Routing 
Policies, Access Policies; Data Loss Prevention: IronPort Data Security