Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1138
 
26-26
Cisco AsyncOS 8.5 for Email User Guide
 
Chapter 26      Using Email Security Monitor
  Email Security Monitor Pages
Malicious URLs are URLs that Outbreak Filters have determined to have poor reputation. 
Suspicious URLs are those that Outbreak Filters have determined to require click-time protection. 
Suspicious URLs have therefore been rewritten to redirect them to the Cisco Web Security proxy. 
Results of URL category-based filters are reflected in content and message filter reports. 
Results of click-time URL evaluations by the Cisco Web Security proxy are not reflected in reports.
TLS Connections Page
The TLS Connections pages shows the overall usage of TLS connections for sent and received mail. The 
report also shows details for each domain sending mail using TLS connections. 
The TLS Connections page can be used to determine the following information:
Overall, what portion of incoming and outgoing connections use TLS? 
What partners do I have successful TLS connections with?
What partners do I have unsuccessful TLS connections with? 
What partners have issue with their TLS certificates?
What percent of overall mail with a partner uses TLS?
The TLS Connections page is divided into a section for incoming connections and a section for outgoing 
connections. Each section includes a graph, summaries, and a table with details. 
The graph displays a view of incoming or outgoing TLS-encrypted and non-encrypted connections over 
the time range you specify. The graph displays the total volume of messages, the volume of encrypted 
and unencrypted messages, and the volume of successful and failed TLS encrypted messages. The 
graphs distinguish between connections in which TLS was required and connections in which TLS was 
merely preferred. 
The table displays details for domains sending or receiving encrypted messages. For each domain, you 
can view the number of required and preferred TLS connections that were successful and that failed, the 
total number of TLS connections attempted (whether successful or failed), and the total number of 
unencrypted connections. You can also view the percentage of all connections in which TLS was 
attempted, and the total number of encrypted messages sent successfully, regardless of whether TLS was 
preferred or required. You can show or hide columns by clicking the Columns link at the bottom of this 
table.