Cisco Cisco Web Security Appliance S170 Guida All'Installazione

Pagina di 28
22
 
You can also define several other policy types to enforce your 
organization’s acceptable use policies by controlling access to 
the Internet. For example, you can define policies for decrypting 
HTTPS transactions and other polices that control upload 
requests.
For information about configuring policies on the Cisco S380 
and Cisco S680 appliance, see the “Working with Policies” 
chapter in the Cisco IronPort AsyncOS for Web User Guide
Reporting
You can view statistics about blocked and monitored web traffic 
on your network by viewing reports available in the web 
interface. You can view reports about the top URL categories 
blocked, client activity, system status, and more.
More Information
There are other features that you may want to configure for 
your Cisco S380 and Cisco S680 appliance. For more 
information about configuring feature keys, end user 
notifications, logging, and for details about other available web 
security appliance features, see the Cisco S380 and Cisco S680 
Web Security Appliance documentation.