Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1212
 
29-23
User Guide for AsyncOS 10.0 for Cisco Email Security Appliances
 
Chapter 29      Using Email Security Monitor
  Email Security Monitor Pages
A list of all the rewritten URLs (malicious and unmalicious). Click on a URL to view a detailed 
report.
Action taken (allow, block, or unknown) when a rewritten URL was clicked. 
Note that, if the verdict of a URL (clean or malicious) was unknown at the time when the end 
user clicked it, the status is shown as unknown. This could be because the URL was under 
further scrutiny or the web server was down or not reachable at the time of the user click. 
The number of times end users clicked on a rewritten URL. Click on a number to view a list of 
all the messages that contain the clicked URL.
While using Web Interaction Tracking reports, keep in mind the following limitations:
If you have configured a content or message filter to deliver messages after rewriting malicious 
URLs and notify another user (for example, an administrator), the web interaction tracking data 
of the original recipient is incremented even if the notified user clicks on the rewritten URLs. 
If you are sending a copy of quarantined messages containing rewritten URLs to a user (for 
example, an administrator) using web interface, the web interaction tracking data of the original 
recipient is incremented even if the user (to whom the copy of the messages were sent) clicks 
on the rewritten URLs.
At any point, if you plan to modify the time of your appliance, make sure that the system time 
is synchronized with Coordinated Universal Time (UTC). 
Forged Email Matches Report
See 
.
File Reputation and File Analysis Reports
For the following reports, see 
Advanced Malware Protection 
File Analysis 
AMP Verdict Updates
Mailbox Auto Remediation Report
You can view the details of the mailbox remediation results using the Mailbox Auto Remediation report 
page (Monitor > Mailbox Auto Remediation). Use this report to view details such as:
A list of recipients for whom the mailbox remediation was successful or unsuccessful
Remedial actions taken on messages
The filenames associated with a SHA-256 hash
Click on a SHA-256 hash to view the related messages in Message Tracking.
For more information, see