Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1212
 
29-37
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Chapter 29      Using Email Security Monitor
  Troubleshooting Email Reports
Related Topics
Generating On-Demand Reports
You can generate a report without scheduling it. These on-demand reports are still based on a specified 
time frame, but they are generated immediately.
Procedure 
Step 1
Click Generate Report Now on the Archived Reports page.
Step 2
Select a report type and edit the title if desired. AsyncOS does not verify the uniqueness of report names. 
To avoid confusion, do not create multiple reports with the same name. 
For more information about the available types of scheduled reports, see 
Step 3
Select a time range for the report data. (This option is not available for Virus Outbreak reports.) 
If you create a custom range, the range will appear as a link. To modify the range, click the link. 
Step 4
Select a format for the report.
PDF. Create a formatted PDF document for delivery, archival, or both. You can view the report as a 
PDF file immediately by clicking Preview PDF Report.
For information about generating PDFs in languages other than English, see th
CSV. Create an ASCII text file that contains the tabular data as comma-separated values. Each CSV 
file may contain up to 100 rows. If a report contains more than one type of table, a separate CSV file 
is created for each table.Specify any report options.
Step 5
Select whether to archive the report (if so, the report will shown on the Archived Reports page).
Step 6
Specify whether to email the report and to which email addresses to send the report.
Step 7
Click Deliver this Report to generate the report and deliver it to recipients or archive it.
Step 8
Commit your changes.
Troubleshooting Email Reports
Link to Message Tracking Gives Unexpected Results 
Problem
Drilling down from a report to view details in message tracking yields unexpected results. 
Solution
This can occur if reporting and message tracking were not simultaneously enabled, functioning 
properly, and storing data locally (as opposed to being stored centrally on a Security Management 
appliance). Data for each feature (reporting and message tracking) is stored only while that feature is