Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 437
 
5-22
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 5      Using Centralized Web Reporting and Tracking
Note
From Client Malware Risk Details table: The client reports sometimes show a user with an asterisk (*) 
at the end of the user name. For example, the Client report might show an entry for both “jsmith” and 
“jsmith*”. User names listed with an asterisk (*) indicate the user name provided by the user, but not 
confirmed by the authentication server. This happens when the authentication server was not available 
at the time and the appliance is configured to permit traffic when authentication service is unavailable.
To view an example of how the User Details page may be used, see 
Web Sites Report 
The Web > Reporting > Web Sites page is an overall aggregation of the activity that is happening on 
the managed appliances. From this page you can monitor high-risk web sites accessed during a specific 
time range.
Malware Threats Detected
From this table you can see the top Malware threats that a specific 
user is triggering. 
You can search for data on a specific malware threat name in the 
Find Malware Threat field. Enter the Malware Threat name and 
click Find Malware Threat. The name of the Malware Threat does 
not need to be an exact match.
Policies Matched
From this section you can find the policy groups that applied to 
this user when accessing the web.
In the text field at the bottom of the section enter the policy name 
and click Find Policy. The name of the policy does not need to 
be an exact match.
Table 5-6
Details on the Web > Reporting > User > User Details Page
Section
Description