Cisco Cisco Content Security Management Appliance M380

ページ / 12
 
7
Release Notes for Cisco IronPort AsyncOS 7.9.1 for Security Management
 
  Resolved Issues
Reporting and Tracking 
Distinction Between Second-Level Domains and Subdomains 
In reporting and tracking searches, second-level domains (regional domains listed at 
) are treated differently from subdomains, even though the two 
domain types may appear to be the same. For example: 
  •
Reports will not include results for a two-level domain such as 
co.uk
, but will include results for 
foo.co.uk
. Reports include subdomains under the main corporate domain, such as 
cisco.com
  •
Tracking search results for the regional domain 
co.uk
 will not include domains such as 
foo.co.uk
while search results for 
cisco.com
 will include subdomains such as 
subdomain.cisco.com
Web Reporting and Tracking Data Availability for L4TM and Client Malware Risk 
On the Web Tracking page, for L4TM information, only data that is added after upgrade to AsyncOS 7.8 
or 7.9 for Security Management and AsyncOS 7.5 for Web is included in search results. 
Tables on the  L4 Traffic Monitor Page and the Client Malware Risk Page display the number of blocked 
and monitored connections to malware sites. For data that is collected after upgrade to AsyncOS 7.8 or 
7.9 for Security Management and AsyncOS 7.5 for Web, you can click a number in the table to view 
details about the relevant individual connections.  For pre-upgrade data, only the totals are available. 
Filtering by port on the  L4 Traffic Monitor Page is also not available for pre-upgrade data. 
For more information about these pages, see the “Using Centralized Web Reporting” chapter in the 
Cisco IronPort AsyncOS for Security Management User Guide.
Supported Hardware 
Any references in the Online Help or User Guide to M600 or M1000 appliances are no longer valid. This 
release of AsyncOS for Security Management is not supported on those appliances. 
Resolved Issues 
Table 3
Resolved Issues in This Release of AsyncOs 7.9.1 for Security Management  
Old Defect ID
New Defect ID  Description
Resolved in Release 7.9.1-102 
CSCzv24579
Fixed: Web Framework Authenticated Command Injection Vulnerability
A vulnerability in the appliance could have allowed an authenticated, remote attacker to 
execute arbitrary commands on the underlying operating system with elevated privileges.
For more information, see the Cisco security advisory at