Cisco Cisco Content Security Management Appliance M160 Guia Do Utilizador
5-55
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 5 Using Centralized Web Reporting and Tracking
•
IP address associated with a computer in your organization
•
Connection type
•
The Web Security appliance that processed the connection
The first 1000 matching search results are displayed.
To view the hostname at the questionable site or the Web Security appliance that processed the
transaction, click the Display Details link in the Destination IP Address column heading.
transaction, click the Display Details link in the Destination IP Address column heading.
For more information about how you can use this information, see
.
Related Topics
•
Searching for Transactions Processed by the SOCKS Proxy
You can search for transactions that meet a variety of criteria, including blocked or completed
transactions; users; and destination domain, IP address, or port. You can also filter results by custom
URL category, policy matched, and user location (local or remote).
transactions; users; and destination domain, IP address, or port. You can also filter results by custom
URL category, policy matched, and user location (local or remote).
Procedure
Step 1
Choose Web > Reporting > Web Tracking.
Step 2
Click the SOCKS Proxy tab.
Step 3
To filter results, click Advanced.
Step 4
Enter search criteria.
Step 5
Click Search.
Related Topics
•
About Web Tracking and Upgrades
New web tracking features may not apply to transactions that occurred before upgrade, because the
required data may not have been retained for those transactions. For possible limitations related to web
tracking data and upgrades, see the Release Notes for your release.
required data may not have been retained for those transactions. For possible limitations related to web
tracking data and upgrades, see the Release Notes for your release.
System Capacity Page
The Web > Reporting > System Capacity page allows you to view the overall workload that is put on
the Security Management appliance by the Web Security appliances. Most importantly, you can use the
System Capacity page to track growth over time and plan for system capacity. Monitoring your Web
Security appliances ensures that the capacity is appropriate to your volumes. Over time, volume
inevitably rises and appropriate monitoring ensures that additional capacity or configuration changes can
be applied proactively.
the Security Management appliance by the Web Security appliances. Most importantly, you can use the
System Capacity page to track growth over time and plan for system capacity. Monitoring your Web
Security appliances ensures that the capacity is appropriate to your volumes. Over time, volume
inevitably rises and appropriate monitoring ensures that additional capacity or configuration changes can
be applied proactively.
The System Capacity page can be used to determine the following information: