Cisco Cisco Content Security Management Appliance M1070 ユーザーガイド
5-8
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
Table 5-2
Web Reporting Tab Details
Web Reporting Menu
Action
The Overview page provides a synopsis of the activity on your
Web Security appliances. It includes graphs and summary
tables for the incoming and outgoing transactions. For more
information, see the
Web Security appliances. It includes graphs and summary
tables for the incoming and outgoing transactions. For more
information, see the
The Users page provides several web tracking links that
allows you to view web tracking information for individual
users.
allows you to view web tracking information for individual
users.
From the Users page you can view how long a user, or users,
on your system have spent on the internet, on a particular site
or URL, and how much bandwidth that user is using.
on your system have spent on the internet, on a particular site
or URL, and how much bandwidth that user is using.
From the Users page you can click on an individual user in the
interactive Users table to view more details for that specific
user on the User Details page.
interactive Users table to view more details for that specific
user on the User Details page.
The User Details page allows you to see specific information
about a user that you have identified in the Users table on the
Web > Reporting > Users page. From this page you can
investigate individual user’s activity on your system. This
page is particularly useful if you are running user-level
investigations and need to find out, for example, what sites
your users are visiting, what Malware threats they are
encountering, what URL categories they are accessing, and
how much time a specific user is spending at these sites.
about a user that you have identified in the Users table on the
Web > Reporting > Users page. From this page you can
investigate individual user’s activity on your system. This
page is particularly useful if you are running user-level
investigations and need to find out, for example, what sites
your users are visiting, what Malware threats they are
encountering, what URL categories they are accessing, and
how much time a specific user is spending at these sites.
For more information, see the
. For information on a specific user in your
system, see the
The Web Sites page allows you to view an overall aggregation
of the activity that is happening on your managed appliances.
From this page you can monitor high-risk web sites accessed
during a specific time range. For more information, see the
of the activity that is happening on your managed appliances.
From this page you can monitor high-risk web sites accessed
during a specific time range. For more information, see the
The URL Categories page allows you to view the top URL
Categories that are being visited, including:
Categories that are being visited, including:
•
the top URLs that have triggered a block or warning
action to occur per transaction.
action to occur per transaction.
•
all the URL categories during a specified time range for
both completed, warned and blocked transactions. This is
an interactive table with interactive column headings that
you can use to sort data as you need.
both completed, warned and blocked transactions. This is
an interactive table with interactive column headings that
you can use to sort data as you need.
For more information, see the
.