Cisco Cisco Web Security Appliance S190 Guía Del Usuario
23-35
Cisco IronPort AsyncOS 7.1 for Web User Guide
OL-23207-01
Chapter 23 Web Security Appliance Reports
Web Tracking Page
From the Reports by User Location page you can generate reports showing the
activity of local and remote users. This allows you to easily compare local and
remote activities of your users.
activity of local and remote users. This allows you to easily compare local and
remote activities of your users.
Web Tracking Page
You can use the Reporting > Web Tracking page to track and report on web
usage for a particular user or all users. Web tracking aggregates information from
individual security components as well as acceptable use enforcement
components and records data that can be used to monitor your web traffic patterns
and security risks.
usage for a particular user or all users. Web tracking aggregates information from
individual security components as well as acceptable use enforcement
components and records data that can be used to monitor your web traffic patterns
and security risks.
Table 23-12
Reports by User Location Report Page Components
Section
Description
Time Range (drop-down list)
A menu that allows to choose the time range of the data contained
in the report. For more information, see the
in the report. For more information, see the
.
Total Web Proxy Activity: Remote Users
This section displays, in graph format, the activity of your remote
users (vertical) over the specified time (horizontal).
users (vertical) over the specified time (horizontal).
Web Proxy Summary
This section displays a summary of the activities of the local and
remote users on the network.
remote users on the network.
Total Web Proxy Activity: Local Users
This section displays, in graph format, the activity of your remote
users (vertical) over the specified time (horizontal).
users (vertical) over the specified time (horizontal).
Suspect Transactions Detected: Remote
Users
Users
This section displays, in graph format, the suspect transactions
that have been detected due to Access Policies defined for remote
users (vertical) over the specified time (horizontal).
that have been detected due to Access Policies defined for remote
users (vertical) over the specified time (horizontal).
Suspect Transactions Summary
This section displays a summary of suspected transactions of the
remote users on the network.
remote users on the network.
Suspect Transactions Detected: Local
Users
Users
This section displays, in graph format, the suspect transactions
that have been detected due to Access Policies defined for your
remote users (vertical) over the specified time (horizontal).
that have been detected due to Access Policies defined for your
remote users (vertical) over the specified time (horizontal).
Suspect Transactions Summary
This section displays a summary of suspected transactions of the
local users on the network.
local users on the network.