Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 450
 
4-30
AsyncOS 9.6 for Cisco Content Security Management Appliances User Guide
 
Chapter 4      Using Centralized Email Security Reporting
  Understanding the Email Reporting Pages
Step 3
Activate your management appliance account. 
Additional Requirements 
For any additional requirements, see the Release Notes for your Security Management appliance release, 
available from 
Identifying Files by SHA-256 Hash 
Because filenames can easily be changed, the appliance generates an identifier for each file using a 
Secure Hash Algorithm (SHA-256). If an appliance processes the same file with different names, all 
instances are recognized as the same SHA-256. If multiple appliances process the same file, all instances 
of the file have the same SHA-256 identifier. 
In most reports, files are listed by their SHA-256 value (in an abbreviated format). 
File Reputation and File Analysis Report Pages 
Report Description 
Advanced Malware 
Protection 
Shows file-based threats that were identified by the file reputation service. 
For files with changed verdicts, see the AMP Verdict updates report. Those 
verdicts are not reflected in the Advanced Malware Protection report. 
If a file extracted from a compressed or archived file is malicious, only the 
SHA value of the compressed or archived file is included in the Advanced 
Malware Protection report.