Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 390
 
5-36
AsyncOS 8.2 for Cisco Content Security Management User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
For more information about the distinction between the Web Proxy and the L4 Traffic Monitor, see the 
“Understanding How the Web Security Appliance Works” section in the online help or user guide for 
your Web Security appliance. 
Related Topics 
Searching for Transactions Processed by Web Proxy Services 
Use the Proxy Services tab on the Web > Reporting > Web Tracking page to search web tracking data 
aggregated from individual security components and acceptable use enforcement components. This data 
does not include L4 Traffic Monitoring data or transactions processed by the SOCKS Proxy. 
You might want to use it to assist the following roles:
HR or Legal manager. Run an investigative report for an employee during a specific time period. 
For example, you can use the Proxy Services tab to retrieve information about a specific URL that 
a user is accessing, what time the user visited that URL, whether that URL is allowed, etc. 
Network security administrator. Examine whether the company network is being exposed to 
malware threats through employees’ smartphones.
You can view search results for the transactions recorded (including blocked, monitored, warned, and 
completed) during a particular time period. You can also filter the data results using several criteria, such 
as URL category, malware threat, and application. 
Note
The Web Proxy only reports on transactions that include an ACL decision tag other than 
“OTHER-NONE.
For an example of Web Tracking usage, see the 
For an example of how the Proxy Services tab can be used with other web reporting pages, see the 
Procedure 
Step 1
On the Security Management appliance, choose Web > Reporting > Web Tracking.
Step 2
Click the Proxy Services tab. 
Step 3
To see all search and filtering options, click Advanced
Step 4
Enter search criteria: 
Table 5-13
Web Tracking Search Criteria on the Proxy Services Tab 
Option
Description 
Default Search Criteria 
Time Range 
Choose the time range on which to report. For information on time 
ranges available on the Security Management appliance, see the 
“Choosing a Time Range for Reports” section on page 3-4
.