Cisco Cisco Content Security Management Appliance M170 Guia Do Utilizador
4-8
AsyncOS 8.3 for Cisco Content Security Management User Guide
Chapter 4 Using Centralized Email Security Reporting
Understanding the Email Reporting Pages
Use this page to view the URL categories most frequently
occurring in messages, the most common URLs in spam
messages, and the number of malicious and suspicious URLs
seen in messages.
occurring in messages, the most common URLs in spam
messages, and the number of malicious and suspicious URLs
seen in messages.
For more information, see the
The TLS Connections page shows the overall usage of TLS
connections for sent and received mail. The report also shows
details for each domain sending mail using TLS connections.
connections for sent and received mail. The report also shows
details for each domain sending mail using TLS connections.
For more information, see the
.
The Inbound SMTP authentication page shows the use of
client certificates and the SMTP AUTH command to
authenticate SMTP sessions between the Email Security
appliance and users’ mail clients.
client certificates and the SMTP AUTH command to
authenticate SMTP sessions between the Email Security
appliance and users’ mail clients.
For more information, see
.
The Outbreak Filters page shows information about recent
outbreaks and the messages quarantined by Outbreak Filters.
Use this page to monitor your defense against virus attacks.
outbreaks and the messages quarantined by Outbreak Filters.
Use this page to monitor your defense against virus attacks.
For more information, see the
The Rate Limits page shows the mail senders (based on
MAIL-FROM address) who exceed the threshold you set for
the number of message recipients per sender.
MAIL-FROM address) who exceed the threshold you set for
the number of message recipients per sender.
For more information, see the
Allows you to view the overall workload that is sending
reporting data to the Security Management appliance.
reporting data to the Security Management appliance.
For more information, see the
.
Allows you to get a glimpse of the impact of the reporting data
on the Security Management appliance for each appliance.
For more information, see the
on the Security Management appliance for each appliance.
For more information, see the
.
Allows you to schedule reports for a specified time range. For
more information, see the
more information, see the
.
Allows you to view and manage archived reports. For more
information, see the
information, see the
.
Also allows you to generate on-demand reports. See
Table 4-1
Email Reporting Tab Options
Email Reporting Menu
Action