Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 450
 
5-32
AsyncOS 9.6 for Cisco Content Security Management Appliances User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
  Web Reporting Page Descriptions
From the Reports by User Location page you can generate reports showing the activity of local and 
remote users. This allows you to easily compare local and remote activities of your users.
Tip
To customize your view of this report, see 
.
Note
You can generate a scheduled report for information on the Reports by User Location page. For 
information on scheduling a report, see the 
System Capacity Page
The Web > Reporting > System Capacity page allows you to view the overall workload that is put on 
the Security Management appliance by the Web Security appliances. Most importantly, you can use the 
System Capacity page to track growth over time and plan for system capacity. Monitoring your Web 
Security appliances ensures that the capacity is appropriate to your volumes. Over time, volume 
inevitably rises and appropriate monitoring ensures that additional capacity or configuration changes can 
be applied proactively. 
The System Capacity page can be used to determine the following information:
Identify when Web Security appliances are exceeding recommended CPU capacity; this enables you 
to determine when configuration optimization or additional appliances are needed.
For troubleshooting, identify which parts of the system are using the most resources.
Identify response time and Proxy buffer memory.
Identify the transactions per second, and any connections that are outstanding.
Viewing the System Capacity Report 
Procedure 
Step 1
On the Security Management appliance, choose Web > Reporting > System Capacity.
Step 2
To view different types of data, click Columns and choose the data to view.
Step 3
To see the system capacity for a single appliance, click the appliance in the Web Security appliance 
column in the Overview of Averaged Usage and Performance table. 
The System Capacity graphs appear for that appliance. The graphs on the page are divided into two sets:
Suspect Transactions Detected: Local 
Users
This section displays, in graph format, the suspect transactions 
that have been detected due to access policies that you have 
defined for your remote users (vertical) over the specified time 
(horizontal). 
Suspect Transactions Summary
This section displays a summary of suspected transactions of the 
local users on your system.
Table 5-12
Details on the Web > Reporting > Reports by User Location Page
Section
Description