Cisco Cisco Content Security Management Appliance M1070 ユーザーガイド
4-17
AsyncOS 9.6 for Cisco Content Security Management Appliances User Guide
Chapter 4 Using Centralized Email Security Reporting
Understanding the Email Reporting Pages
See the
for an explanation of the data included in
the Incoming Mail Details interactive table.
From the Incoming Mail page you can also generate a PDF or export raw data to a CSV file. For
information on printing or exporting a file, see the
information on printing or exporting a file, see the
.
Note
You can generate a scheduled report for the Incoming Mail report page. See the
“No Domain Information” Link
Domains that have connected to the Security Management appliances and could not be verified with a
double-DNS lookup are automatically grouped into the special domain called “No Domain Information.”
You can control how these types of unverified hosts are managed via Sender Verification. For more
information about Sender Verification, see the documentation or online help for your Email Security
appliance.
double-DNS lookup are automatically grouped into the special domain called “No Domain Information.”
You can control how these types of unverified hosts are managed via Sender Verification. For more
information about Sender Verification, see the documentation or online help for your Email Security
appliance.
You can use the Items Displayed menu to select the number of senders to display in the list.
Time Ranges in the Mail Trend Graphs
You can select varying degrees of granularity to see your data in a mail graph. You can select a day, week,
month, and year views of the same data. Because the data is monitored in real time, information is
periodically updated and summarized in the database.
month, and year views of the same data. Because the data is monitored in real time, information is
periodically updated and summarized in the database.
For more information on time ranges, see
.
Incoming Mail Details Table
The interactive Incoming Mail Details table at the bottom of the Incoming Mail page lists the top
senders that have connected to public listeners on the Email Security appliances. The table shows
domains, IP addresses, or network owners, based on the view selected. Click the column headings to sort
the data.
senders that have connected to public listeners on the Email Security appliances. The table shows
domains, IP addresses, or network owners, based on the view selected. Click the column headings to sort
the data.
The system acquires and verifies the validity of the remote host’s IP address by performing a double DNS
lookup. For more information about double DNS lookups and sender verification, see the documentation
or online help for your Email Security appliance.
lookup. For more information about double DNS lookups and sender verification, see the documentation
or online help for your Email Security appliance.
For senders, that is Network Owner, IP Address or Domain, listed in the first column of the Incoming
Mail Details table, or on the Top Senders by Total Threat Messages, click the Sender or No Domain
Information link to view more information about the sender. The results appear on a Sender Profile
page, which includes real-time information from the SenderBase Reputation Service. From the Sender
Profile page, you can view for more information about specific IP addresses or network owners. For
more information, see the
Mail Details table, or on the Top Senders by Total Threat Messages, click the Sender or No Domain
Information link to view more information about the sender. The results appear on a Sender Profile
page, which includes real-time information from the SenderBase Reputation Service. From the Sender
Profile page, you can view for more information about specific IP addresses or network owners. For
more information, see the
You can also view the Sender Groups report, by clicking Sender Groups report at the bottom of the
Incoming Mail page. For more information about the Sender Groups report page, see the
Incoming Mail page. For more information about the Sender Groups report page, see the
If your access privileges allow you to view Message Tracking data: To view Message Tracking details
for the Content Filter violations in this report, click a blue number link in the table.
for the Content Filter violations in this report, click a blue number link in the table.