Cisco Cisco Content Security Management Appliance M160 Guia Do Utilizador

Página de 450
 
5-31
AsyncOS 9.6 for Cisco Content Security Management Appliances User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
  Web Reporting Page Descriptions
SOCKS Proxy Report 
The Web > Reporting > SOCKS Proxy Page allows you to view data and trends for transactions 
processed through the SOCKS proxy, including information about destinations and users. 
Note
The destination shown in the report is the address that the SOCKS client (typically a browser) sends to 
the SOCKS proxy. 
To change SOCKS policy settings, see the online help or user guide for your Web Security appliance. 
Related Topics
 
Reports by User Location 
The Web > Reporting > Reports by User Location Page allows you to find out what activities your 
mobile users are conducting from their local or remote systems. 
Activities include:
URL Categories that are being accessed by the local and remote users.
Anti-Malware activity that is being triggered by sites the local and remote users are accessing.
Web Reputation of the sites being accessed by the local and remote users.
Applications that are being accessed by the local and remote users.
Users (local and remote).
Domains accessed by local and remote users.
From the Reports by User Location page, you can view the following information:
Table 5-12
Details on the Web > Reporting > Reports by User Location Page
Section
Description
Time Range (drop-down list)
A drop-down list that can range from a day to 90 days or a custom 
range. For more information on time ranges and customizing this 
for your needs, see the 
Total Web Proxy Activity: Remote Users
This section displays, in graph format, the activity of your remote 
users (vertical) over the specified time (horizontal). 
Web Proxy Summary
This section displays a summary of the activities of the local and 
remote users on your system.
Total Web Proxy Activity: Local Users
This section displays, in graph format, the activity of your remote 
users (vertical) over the specified time (horizontal). 
Suspect Transactions Detected: Remote 
Users
This section displays, in graph format, the suspect transactions 
that have been detected due to access policies that you have 
defined for your remote users (vertical) over the specified time 
(horizontal). 
Suspect Transactions Summary
This section displays a summary of suspected transactions of the 
remote users on your system.