Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 619
 
23-32
Cisco IronPort AsyncOS 7.7.5 for Web User Guide
Chapter 23      Web Security Appliance Reports
Web Tracking Page
 describes the information on the Reports by User Location page. 
From the Reports by User Location page you can generate reports showing the activity of local and 
remote users. This allows you to easily compare local and remote activities of your users.
Web Tracking Page 
Use the Web Tracking page to search for and get details about individual transactions or patterns of 
transactions that may be of concern. Depending on your needs, search in one or both of the following 
tabs: 
  •
  •
  •
Searching for Transactions Processed by the Web Proxy 
You can use the Proxy Services tab on the Reporting > Web Tracking page to track and report on web 
usage for a particular user or for all users. This tab aggregates web tracking information from individual 
security components as well as acceptable use enforcement components and records data that can be 
used to monitor your web traffic patterns and security risks.
The Proxy Services tab shows results for individual transactions and the results include the hostname 
and domain in the URL (such as mail.google.com) instead of just the domain name (such as google.com). 
Table 23-11
Reports by User Location Report Page Components 
Section
Description
Time Range (drop-down list)
A menu that allows to choose the time range of the data contained 
in the report. For more information, see the 
Total Web Proxy Activity: Remote Users
This section displays, in graph format, the activity of your remote 
users (vertical) over the specified time (horizontal). 
Web Proxy Summary
This section displays a summary of the activities of the local and 
remote users on the network.
Total Web Proxy Activity: Local Users
This section displays, in graph format, the activity of your remote 
users (vertical) over the specified time (horizontal). 
Suspect Transactions Detected: Remote 
Users
This section displays, in graph format, the suspect transactions 
that have been detected due to Access Policies defined for remote 
users (vertical) over the specified time (horizontal). 
Suspect Transactions Summary
This section displays a summary of suspected transactions of the 
remote users on the network.
Suspect Transactions Detected: Local 
Users
This section displays, in graph format, the suspect transactions 
that have been detected due to Access Policies defined for your 
remote users (vertical) over the specified time (horizontal). 
Suspect Transactions Summary
This section displays a summary of suspected transactions of the 
local users on the network.