Cisco Cisco Content Security Management Appliance M390 Guia Do Utilizador
4-37
AsyncOS 8.3 for Cisco Content Security Management User Guide
Chapter 4 Using Centralized Email Security Reporting
About Scheduled and On-Demand Email Reports
•
Generate report by specifying individual domains. Enter the domains for the report and the email
addresses for the report recipients. Use commas to separate multiple entries. You can also use
subdomains, such as subdomain.yourdomain.com. Specifying individual domains is recommended
if you create reports for a small number of domains that are not expected to change frequently.
addresses for the report recipients. Use commas to separate multiple entries. You can also use
subdomains, such as subdomain.yourdomain.com. Specifying individual domains is recommended
if you create reports for a small number of domains that are not expected to change frequently.
•
Generate reports by uploading file. Import a configuration file that contains a list of the domains
and recipient email addresses for the report. You can select a configuration file from the
configuration directory on the appliance or upload one from your local computer. Using a
configuration file is recommended if you create reports for a large number of domains that change
frequently. For more information on configuration files for domain-based reports, see
and recipient email addresses for the report. You can select a configuration file from the
configuration directory on the appliance or upload one from your local computer. Using a
configuration file is recommended if you create reports for a large number of domains that change
frequently. For more information on configuration files for domain-based reports, see
.
Note
If you send reports to an external account (such as Yahoo! Mail or Gmail), you may need to add
the reporting return address to the external account’s whitelist to prevent report messages from
being incorrectly classified as spam.
the reporting return address to the external account’s whitelist to prevent report messages from
being incorrectly classified as spam.
Step 4
In the Title text field, type the name of the title for the report.
AsyncOS does not verify the uniqueness of report names. To avoid confusion, do not create multiple
reports with the same name.
reports with the same name.
Step 5
In the Outgoing Domain section, choose the domain type for the outgoing mail summary. Choices are:
By Server or By Email Address.
By Server or By Email Address.
Step 6
From the Time Range to Include drop-down list, select a time range for the report data.
Step 7
In the Format section, choose the format of the report.
Choices include:
•
PDF. Create a formatted PDF document for delivery, archival, or both. You can view the report as a
PDF file immediately by clicking Preview PDF Report.
PDF file immediately by clicking Preview PDF Report.
•
CSV. Create an ASCII text file that contains raw data as comma-separated values. Each CSV file
may contain up to 100 rows. If a report contains more than one type of table, a separate CSV file is
created for each table.
may contain up to 100 rows. If a report contains more than one type of table, a separate CSV file is
created for each table.
Step 8
From the Schedule section, choose a schedule for generating the report.
Choices include: Daily, Weekly (drop-down list for day of week included), or monthly.
Step 9
(Optional) Upload a custom logo for the report. The logo appears at the top of the report.
•
The logo should be a .jpg, .gif, or .png file that is at most 550 x 50 pixels.
•
If a logo file is not supplied, the default Cisco logo is used.
Step 10
Select a language for this report. For generating PDFs in Asian languages, see important information at
.
Step 11
Click Submit to submit your changes on the page, then click Commit Changes to commit your changes.
Executive Summary Report
The Executive Summary Report is a high-level overview of the incoming and outgoing email message
activity from your Email Security appliances. that can be viewed on the Security Management appliance.
activity from your Email Security appliances. that can be viewed on the Security Management appliance.