Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi
4-8
AsyncOS 8.3.7 for Cisco Content Security Management User Guide
Chapter 4 Using Centralized Email Security Reporting
Understanding the Email Reporting Pages
Use this page to view the URL categories most frequently
occurring in messages, the most common URLs in spam
messages, and the number of malicious and suspicious URLs
seen in messages.
occurring in messages, the most common URLs in spam
messages, and the number of malicious and suspicious URLs
seen in messages.
For more information, see the
There are three reporting pages showing file reputation and
analysis data.
analysis data.
For more information, see the
The TLS Connections page shows the overall usage of TLS
connections for sent and received mail. The report also shows
details for each domain sending mail using TLS connections.
connections for sent and received mail. The report also shows
details for each domain sending mail using TLS connections.
For more information, see the
.
The Inbound SMTP authentication page shows the use of
client certificates and the SMTP AUTH command to
authenticate SMTP sessions between the Email Security
appliance and users’ mail clients.
client certificates and the SMTP AUTH command to
authenticate SMTP sessions between the Email Security
appliance and users’ mail clients.
For more information, see
.
The Outbreak Filters page shows information about recent
outbreaks and the messages quarantined by Outbreak Filters.
Use this page to monitor your defense against virus attacks.
outbreaks and the messages quarantined by Outbreak Filters.
Use this page to monitor your defense against virus attacks.
For more information, see the
The Rate Limits page shows the mail senders (based on
MAIL-FROM address) who exceed the threshold you set for
the number of message recipients per sender.
MAIL-FROM address) who exceed the threshold you set for
the number of message recipients per sender.
For more information, see the
Allows you to view the overall workload that is sending
reporting data to the Security Management appliance.
reporting data to the Security Management appliance.
For more information, see the
.
Allows you to get a glimpse of the impact of the reporting data
on the Security Management appliance for each appliance.
For more information, see the
on the Security Management appliance for each appliance.
For more information, see the
.
Table 4-1
Email Reporting Tab Options
Email Reporting Menu
Action