Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
5-13
AsyncOS 9.5.x for Cisco Content Security Management Appliances User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Reporting Page Descriptions
Note
From Client Malware Risk Details table: The client reports sometimes show a user with an asterisk (*)
at the end of the user name. For example, the Client report might show an entry for both “jsmith” and
“jsmith*”. User names listed with an asterisk (*) indicate the user name provided by the user, but not
confirmed by the authentication server. This happens when the authentication server was not available
at the time and the appliance is configured to permit traffic when authentication service is unavailable.
at the end of the user name. For example, the Client report might show an entry for both “jsmith” and
“jsmith*”. User names listed with an asterisk (*) indicate the user name provided by the user, but not
confirmed by the authentication server. This happens when the authentication server was not available
at the time and the appliance is configured to permit traffic when authentication service is unavailable.
To view an example of how the User Details page may be used, see
Web Sites Report
The Web > Reporting > Web Sites page is an overall aggregation of the activity that is happening on
the managed appliances. From this page you can monitor high-risk web sites accessed during a specific
time range.
the managed appliances. From this page you can monitor high-risk web sites accessed during a specific
time range.
From the Web Sites page, you can view the following information:
Malware Threats Detected
From this table you can see the top Malware threats that a specific
user is triggering.
user is triggering.
You can search for data on a specific malware threat name in the
Find Malware Threat field. Enter the Malware Threat name and
click Find Malware Threat. The name of the Malware Threat does
not need to be an exact match.
Find Malware Threat field. Enter the Malware Threat name and
click Find Malware Threat. The name of the Malware Threat does
not need to be an exact match.
Policies Matched
From this section you can find the policy groups that applied to
this user when accessing the web.
this user when accessing the web.
In the text field at the bottom of the section enter the policy name
and click Find Policy. The name of the policy does not need to
be an exact match.
and click Find Policy. The name of the policy does not need to
be an exact match.
Table 5-4
Details on the Web > Reporting > User > User Details Page
Section
Description
Table 5-5
Details on the Web > Reporting > Web Sites Page
Section
Description
Time Range (drop-down list)
A drop-down list that can range from a day to 90 days or a custom
range. For more information on time ranges and customizing this
for your needs, see the
range. For more information on time ranges and customizing this
for your needs, see the
.
Top Domains by Total Transactions
This section lists the top domains that are being visited on the site
in a graph format.
in a graph format.