Cisco Cisco Email Security Appliance C170 Guia Do Utilizador

Página de 1219
 
28-34
Cisco AsyncOS 9.1 for Email User Guide
 
Chapter 28      Using Email Security Monitor
  Email Security Monitor Pages
The CSV download returns the rows of data in the table ordered by timestamp and key. You can 
perform further sorting in a separate step such as via a spreadsheet application.
The first row contains column headers that match the display names shown in the report. Note that 
timestamps (see 
) and keys (see 
) also appear.
Related Topics
Sample URL
http://example.com/monitor/content_filters?format=csv&sort_col_ss_0_0_0=MAIL_CONTENT_FILT
ER_INCOMING.RECIPIENTS_MATCHED&section=ss_0_0_0&date_range=current_day&sort_order
_ss_0_0_0=desc&report_def_id=mga_content_filters
Adding Basic HTTP Authentication credentials
To specify basic HTTP Authentication credentials to the URL:
http://example.com/monitor/
becomes:
http://username:password@example.com/monitor/
File Format
The downloaded file is in CSV format and has a .csv file extension. The file header has a default 
filename, which starts with the name of the report, then the section of the report.
Timestamps
Exports that stream data show begin and end timestamps for each raw “interval” of time. Two begin and 
two end timestamps are provided — one in numeric format and the other in human-readable string 
format. The timestamps are in GMT time, which should make log aggregation easier if you have 
appliances in multiple time zones.
Note that in some rare cases where the data has been merged with data from other sources, the export 
file does not include timestamps. For example, the Outbreak Details export merges report data with 
Threat Operations Center (TOC) data, making timestamps irrelevant because there are no intervals.
Keys
Exports also include the report table key(s), even in cases where the keys are not visible in the report. In 
cases where a key is shown, the display name shown in the report is used as the column header. 
Otherwise, a column header such as “key0,” “key1,” etc. is shown.