Cisco Cisco Content Security Management Appliance M1070 사용자 가이드
5-51
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
For more information about the distinction between the Web Proxy and the L4 Traffic Monitor, see the
“Understanding How the Web Security Appliance Works” section in the Cisco IronPort AsyncOS for Web
Security User Guide.
“Understanding How the Web Security Appliance Works” section in the Cisco IronPort AsyncOS for Web
Security User Guide.
Related Topics
•
Searching for Transactions Processed by Web Proxy Services
Use the Proxy Services tab on the Web > Reporting > Web Tracking page to search web tracking data
aggregated from individual security components and acceptable use enforcement components. This data
does not include L4 Traffic Monitoring data.
aggregated from individual security components and acceptable use enforcement components. This data
does not include L4 Traffic Monitoring data.
You might want to use it to assist the following roles:
•
HR or Legal manager. Run an investigative report for an employee during a specific time period.
For example, you can use the Proxy Services tab to retrieve information about a specific URL that
a user is accessing, what time the user visited that URL, whether that URL is allowed, etc.
a user is accessing, what time the user visited that URL, whether that URL is allowed, etc.
•
Network security administrator. Examine whether the company network is being exposed to
malware threats through employees’ smartphones.
malware threats through employees’ smartphones.
You can view search results for the transactions recorded (including blocked, monitored, warned, and
completed) during a particular time period. You can also filter the data results using several criteria, such
as URL category, malware threat, and application.
completed) during a particular time period. You can also filter the data results using several criteria, such
as URL category, malware threat, and application.
Note
The Web Proxy only reports on transactions that include an ACL decision tag other than
“OTHER-NONE.
“OTHER-NONE.
For an example of Web Tracking usage, see the
For an example of how the Proxy Services tab can be used with other web reporting pages, see the
.
To search for instances of web activity that concern you:
Procedure
Step 1
On the Security Management appliance, choose Web > Reporting > Web Tracking.
Step 2
Click the Proxy Services tab.
Step 3
To see all search and filtering options, click Advanced.
Step 4
Enter search criteria:
Table 5-15
Web Tracking Search Criteria on the Proxy Services Tab
Option
Description
Default Search Criteria
Time Range
Choose the time range on which to report. For information on time
ranges available on the Security Management appliance, see the
ranges available on the Security Management appliance, see the