Cisco Cisco Content Security Management Appliance M1070 Guida Utente
4-31
AsyncOS 8.2 for Cisco Content Security Management User Guide
Chapter 4 Using Centralized Email Security Reporting
System Capacity – System Load
The system load report shows the overall CPU usage on the Email Security appliances. AsyncOS is
optimized to use idle CPU resources to improve message throughput. High CPU usage may not indicate
a system capacity problem. If the high CPU usage is coupled with consistent, high-volume memory page
swapping, you may have a capacity problem. This page also shows a graph that displays the amount of
CPU used by different functions, including mail processing, spam and virus engines, reporting, and
quarantines. The CPU-by-function graph is an indicator of which areas of the product use the most
resources on your system. If you need to optimize your appliance, this graph can help you determine
which functions may need to be tuned or disabled.
optimized to use idle CPU resources to improve message throughput. High CPU usage may not indicate
a system capacity problem. If the high CPU usage is coupled with consistent, high-volume memory page
swapping, you may have a capacity problem. This page also shows a graph that displays the amount of
CPU used by different functions, including mail processing, spam and virus engines, reporting, and
quarantines. The CPU-by-function graph is an indicator of which areas of the product use the most
resources on your system. If you need to optimize your appliance, this graph can help you determine
which functions may need to be tuned or disabled.
The memory page swapping graph shows how frequently the system must page to disk, in kilobytes per
second.
second.
Note About Memory Page Swapping
The system is designed to swap memory regularly, so some memory swapping is expected and is not an
indication of problems with your appliance. Unless the system consistently swaps memory in high
volumes, memory swapping is normal and expected behavior (especially on C150 appliances). To
improve performance, you may need to add Cisco Content Security appliances to your network or tune
your configuration to ensure maximum throughput.
indication of problems with your appliance. Unless the system consistently swaps memory in high
volumes, memory swapping is normal and expected behavior (especially on C150 appliances). To
improve performance, you may need to add Cisco Content Security appliances to your network or tune
your configuration to ensure maximum throughput.
System Capacity – All
The All page consolidates all the previous system capacity reports onto a single page so you can view
the relationship between the different reports. For example, you might see that the message queue is high
at the same time that excessive memory swapping takes place. This might be an indication that you have
a capacity problem. You may want to save this page as a PDF file to preserve a snapshot of system
performance for later reference (or to share with support staff).
the relationship between the different reports. For example, you might see that the message queue is high
at the same time that excessive memory swapping takes place. This might be an indication that you have
a capacity problem. You may want to save this page as a PDF file to preserve a snapshot of system
performance for later reference (or to share with support staff).
Reporting Data Availability Page
The Email > Reporting > Reporting Data Availability page allows you to view, update and sort data
to provide real-time visibility into resource utilization and email traffic trouble spots.
to provide real-time visibility into resource utilization and email traffic trouble spots.
All data resource utilization and email traffic trouble spots are shown from this page, including the data
availability for the overall appliances that are managed by the Security Management appliance.
availability for the overall appliances that are managed by the Security Management appliance.
From this report page you can also view the data availability for a specific appliance and time range.
About Scheduled and On-Demand Email Reports
Types of Reports Available
Except as noted, the following types of Email Security reports are available as both scheduled and
on-demand reports:
on-demand reports:
•
Content Filters—This report includes up to 40 content filters. For additional information on what is
included on this page, see the
included on this page, see the
.
•
DLP Incident Summary—For information on what is included on this page, see the