Cisco Cisco Content Security Management Appliance M1070 Guida Utente
5-36
AsyncOS 8.3 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Web Tracking
For more information about the distinction between the Web Proxy and the L4 Traffic Monitor, see the
“Understanding How the Web Security Appliance Works” section in the online help or user guide for
your Web Security appliance.
“Understanding How the Web Security Appliance Works” section in the online help or user guide for
your Web Security appliance.
Related Topics
•
Searching for Transactions Processed by Web Proxy Services
Use the Proxy Services tab on the Web > Reporting > Web Tracking page to search web tracking data
aggregated from individual security components and acceptable use enforcement components. This data
does not include L4 Traffic Monitoring data or transactions processed by the SOCKS Proxy.
aggregated from individual security components and acceptable use enforcement components. This data
does not include L4 Traffic Monitoring data or transactions processed by the SOCKS Proxy.
You might want to use it to assist the following roles:
•
HR or Legal manager. Run an investigative report for an employee during a specific time period.
For example, you can use the Proxy Services tab to retrieve information about a specific URL that
a user is accessing, what time the user visited that URL, whether that URL is allowed, etc.
a user is accessing, what time the user visited that URL, whether that URL is allowed, etc.
•
Network security administrator. Examine whether the company network is being exposed to
malware threats through employees’ smartphones.
malware threats through employees’ smartphones.
You can view search results for the transactions recorded (including blocked, monitored, warned, and
completed) during a particular time period. You can also filter the data results using several criteria, such
as URL category, malware threat, and application.
completed) during a particular time period. You can also filter the data results using several criteria, such
as URL category, malware threat, and application.
Note
The Web Proxy only reports on transactions that include an ACL decision tag other than
“OTHER-NONE.
“OTHER-NONE.
For an example of Web Tracking usage, see the
.
For an example of how the Proxy Services tab can be used with other web reporting pages, see the
.
Procedure
Step 1
On the Security Management appliance, choose Web > Reporting > Web Tracking.
Step 2
Click the Proxy Services tab.
Step 3
To see all search and filtering options, click Advanced.
Step 4
Enter search criteria:
Table 5-13
Web Tracking Search Criteria on the Proxy Services Tab
Option
Description
Default Search Criteria
Time Range
Choose the time range on which to report. For information on time
ranges available on the Security Management appliance, see the
ranges available on the Security Management appliance, see the