Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 437
 
4-18
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 4      Using Centralized Email Security Reporting
From the Incoming Mail page you can also generate a PDF or export raw data to a CSV file. For 
information on printing or exporting a file, see th
.
Note
You can generate a scheduled report for the Incoming Mail report page. See the 
“No Domain Information” Link
Domains that have connected to the Security Management appliances and could not be verified with a 
double-DNS lookup are automatically grouped into the special domain called “No Domain Information.” 
You can control how these types of unverified hosts are managed via Sender Verification. For more 
information about Sender Verification, see the documentation or online help for your Email Security 
appliance.
You can use the Items Displayed menu to select the number of senders to display in the list.
Time Ranges in the Mail Trend Graphs
You can select varying degrees of granularity to see your data in a mail graph. You can select a day, week, 
month, and year views of the same data. Because the data is monitored in real time, information is 
periodically updated and summarized in the database. 
For more information on time ranges, see 
.
Incoming Mail Details Table
The interactive Incoming Mail Details table at the bottom of the Incoming Mail page lists the top 
senders that have connected to public listeners on the Email Security appliances. The table shows 
domains, IP addresses, or network owners, based on the view selected. Click the column headings to sort 
the data. 
The system acquires and verifies the validity of the remote host’s IP address by performing a double DNS 
lookup
. For more information about double DNS lookups and sender verification, see the documentation 
or online help for your Email Security appliance.
For senders, that is Network Owner, IP Address or Domain, listed in the first column of the Incoming 
Mail Details table, or on the Top Senders by Total Threat Messages, click the Sender or No Domain 
Information
 link to view more information about the sender. The results appear on a Sender Profile 
page, which includes real-time information from the SenderBase Reputation Service. From the Sender 
Profile page, you can view for more information about specific IP addresses or network owners. For 
more information, see the 
.
You can also view the Sender Groups report, by clicking Sender Groups report at the bottom of the 
Incoming Mail page. For more information about the Sender Groups report page, see the 
If your access privileges allow you to view Message Tracking data: To view Message Tracking details 
for the Content Filter violations in this report, click a blue number link in the table.