Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 619
 
1-9
Cisco IronPort AsyncOS 7.7.5 for Web User Guide
 
Chapter 1      Getting Started with the Web Security Appliance
Web Security Appliance Overview
Cisco Support Community
Cisco Support Community is an online forum for Cisco customers, partners, and employees. It provides 
a place to discuss general email and web security issues, as well as technical information about specific 
Cisco products. You can post topics to the forum to ask questions and share information with other Cisco 
and Cisco IronPort users. 
Access the Cisco Support Community at the following URLs:
  •
For email security and associated management: 
  •
For web security and associated management: 
Customer Support 
Use the following methods to obtain support:
U.S.: Call 1 (408) 526-7209 or Toll-free 1 (800) 553-2447 
International: 
Support Site: 
 
If you purchased support through a reseller or another supplier, please contact that supplier directly with 
your product support issues.
Cisco Welcomes Your Comments
The Cisco IronPort Technical Publications team is interested in improving the product documentation. 
Your comments and suggestions are always welcome. You can send comments to the following email 
address: 
contentsecuritydocs@cisco.com 
Please include the title of this book and the publication date from the title page in the subject line of your 
message.
Web Security Appliance Overview
The Web Security appliance is a robust, secure, efficient device that protects corporate networks against 
web-based malware and spyware programs that can compromise corporate security and expose 
intellectual property. The Web Security appliance includes protection for standard communication 
protocols, such as HTTP, HTTPS, FTP, and SOCKS. 
Malware (“malicious software”) is software designed to infiltrate or damage a computer system without 
the owner’s consent. It can be any kind of hostile, intrusive, or annoying software or program code. 
Web-based malware includes spyware, system monitors, adware, phishing and pharming techniques, 
keystroke (key) loggers, browser hijackers, trojan horses, and more.