Cisco Cisco Content Security Management Appliance M1070 사용자 가이드
Chapter 4 Using Centralized Web Reporting
4-28
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
You can configure the columns that you want to appear in several sections on the
User Details page. For information on configuring columns, see the
User Details page. For information on configuring columns, see the
.
After you have selected the categories that you want to appear in the interactive
sections, you can select how many items you want to be displayed from the Items
Displayed drop-down menu. Choices are: 10, 20, 50, or 100.
sections, you can select how many items you want to be displayed from the Items
Displayed drop-down menu. Choices are: 10, 20, 50, or 100.
To view an example of how the User Details page may be used, see
.
Applications Matched
From this section you can find a specific application that a
specific user is using. For example, if a user is accessing a site
that requires use of a lot of Flash video, you will see the
application type in the Application column.
specific user is using. For example, if a user is accessing a site
that requires use of a lot of Flash video, you will see the
application type in the Application column.
In the text field at the bottom of the section enter the application
name and click Find Application. The name of the application
does not need to be an exact match.
name and click Find Application. The name of the application
does not need to be an exact match.
Malware Threats Detected
From this table you can see the top Malware threats that a specific
user is triggering. In the text field at the bottom of the Malware
Threats section, enter the Malware Threat name and click Find
Malware Threat. The name of the Malware Threat does not need
to be an exact match.
user is triggering. In the text field at the bottom of the Malware
Threats section, enter the Malware Threat name and click Find
Malware Threat. The name of the Malware Threat does not need
to be an exact match.
Policies Matched
From this section you can find a specific policy that is being
enforced on this particular user.
enforced on this particular user.
In the text field at the bottom of the section enter the policy name
and click Find Policy. The name of the policy does not need to
be an exact match.
and click Find Policy. The name of the policy does not need to
be an exact match.
Table 4-6
Details on the Web > Reporting > User > User Details Page
Section
Description