Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 416
 
4-37
AsyncOS 9.0 for Cisco Content Security Management Appliances User Guide
 
Chapter 4      Using Centralized Email Security Reporting
  About Scheduled and On-Demand Email Reports
Outgoing Destinations—For information on what is included on this page, see the 
Outgoing Mail Summary—For information on what is included on this page, see the 
Outgoing Senders: Domains —For information on what is included on this page, see the 
Sender Groups —For information on what is included on this page, see the 
System Capacity—For information on what is included on this page, see the 
TLS Connections—For information on what is included on this page, see th
Virus Types—For information on what is included on this page, see the 
Time ranges 
Depending on the report, these reports can be configured to include data for the previous day, previous 
seven days, previous month, previous calendar day (up to 250), or previous calendar month (up to 12). 
Alternatively, you can include data for a custom number of days (from 2 days to 100 days) or a custom 
number of months (from 2 months to 12 months). 
Regardless of when you run a report, the data is returned from the previous time interval (hour, day, 
week, or month). For example, if you schedule a daily report to run at 1AM, the report will contain data 
from the previous day, midnight to midnight (00:00 to 23:59). 
Languages and Locales 
Note
You can schedule a PDF report or export raw data as a CSV file with a specific locale for that individual 
report. The language drop-down menu on the Scheduled Reports page allows you to view or schedule a 
PDF report in the users current selected locale and language. See important information at 
Storage of Archived Reports 
For information on how long reports are stored for, and when archived reports are deleted from the 
system, see 
Additional Report Types
Two special reports that can be generated in the Email > Reporting section on the Security Management 
appliance are: