Cisco Cisco Content Security Management Appliance M160 Guida Utente

Pagina di 402
 
5-25
AsyncOS 8.3 for Cisco Content Security Management User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
  Web Reporting Page Descriptions
Table 5-11
L4 Traffic Monitor Report Page Components
Section
Description
Time Range (drop-down list)
A menu that allows you to choose a time range on which to report. 
For more information, see 
Top Client IPs 
This section displays, in graph format, the IP addresses of 
computers in your organization that most frequently connect to 
malware sites. 
Click the Chart Options link below the chart to change the display 
from total Malware Connections Detected to Malware 
Connections Monitored or Malware Connections Blocked. 
This chart is the same as the “L4 Traffic Monitor: Malware 
Connections Detected” chart on the 
Top Malware Sites 
This section displays, in graph format, the top malware domains 
detected by the L4 Traffic Monitor. 
Click the Chart Options link below the chart to change the display 
from total Malware Connections Detected to Malware 
Connections Monitored or Malware Connections Blocked. 
Client Source IPs 
This table displays the IP addresses of computers in your 
organization that frequently connect to malware sites. 
To include only data for a particular port, enter a port number into 
the box at the bottom of the table and click Filter by Port. You can 
use this feature to help determine which ports are used by 
malware that “calls home” to malware sites. 
To view details such as the port and destination domain of each 
connection, click an entry in the table. For example, if one 
particular client IP address has a high number of Malware 
Connections Blocked, click the number in that column to view a 
list of each blocked connection. The list is displayed as search 
results in the L4 Traffic Monitor tab on the Web > Reporting > 
Web Tracking page. For more information about this list, see 
This table is the same as the “L4 Traffic Monitor - Clients by 
Malware Risk” table on the