Cisco Cisco Content Security Management Appliance M390 Mode D'Emploi
4-61
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
Chapter 4 Using Centralized Web Reporting
Domains Matched
From the Domains Matched section you can find out about a
specific Domain or IP address that this user has accessed that
could potentially be a Malware risk. You can also see the time
spent on those categories, and various other information that you
have set from the column view. In the text field at the bottom of
the section enter the Domain or IP address and click Find
Domain or IP. The domain or IP address does not need to be an
exact match.
specific Domain or IP address that this user has accessed that
could potentially be a Malware risk. You can also see the time
spent on those categories, and various other information that you
have set from the column view. In the text field at the bottom of
the section enter the Domain or IP address and click Find
Domain or IP. The domain or IP address does not need to be an
exact match.
Applications Matched
From this section you can find a specific application that a
specific user is using that could potentially be a Malware risk.
specific user is using that could potentially be a Malware risk.
For example, if a user is accessing a site that requires use of a lot
of Flash video, you will see the application type in the
Application column. As a system administrator, you might have
decided that anything with Flash video poses a Malware risk.
Therefore, this application will show up in the Applications
Matched section.
of Flash video, you will see the application type in the
Application column. As a system administrator, you might have
decided that anything with Flash video poses a Malware risk.
Therefore, this application will show up in the Applications
Matched section.
In the text field at the bottom of the section enter the application
name and click Find Application. The name of the application
does not need to be an exact match.
name and click Find Application. The name of the application
does not need to be an exact match.
Malware Threats Detected
From this table you can see the top Malware threats that a specific
user is triggering that could potentially be a Malware risk. In the
text field at the bottom of the Malware Threats section, enter the
Malware Threat name and click Find Malware Threat. The
name of the Malware Threat does not need to be an exact match.
user is triggering that could potentially be a Malware risk. In the
text field at the bottom of the Malware Threats section, enter the
Malware Threat name and click Find Malware Threat. The
name of the Malware Threat does not need to be an exact match.
Policies Matched
From this section you can find a specific policy that is being
enforced on this particular user that defines a certain action as a
potential Malware risk.
enforced on this particular user that defines a certain action as a
potential Malware risk.
In the text field at the bottom of the section enter the policy name
and click Find Policy. The name of the policy does not need to
be an exact match.
and click Find Policy. The name of the policy does not need to
be an exact match.
Table 4-14
Details on the Web > Reporting > Client Malware Risk > Client Details Page
Section
Description