Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 408
 
5-37
AsyncOS 8.3.5 for Cisco Content Security Management User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
  Viewing and Managing Archived Web Reports
Step 7
Depending on the options available for the report, choose: 
Number of rows: The number of rows of data to display in the table. 
Charts: Which data to display in the chart(s) in the report: 
Click the default option under Data to display.
Sort Column: The column to sort by for each table. 
Step 8
From the Delivery Option section, choose the following:
If you want this report to appear on the Archived Reports page, select the Archive Report checkbox. 
Note
Domain-Based Executive Summary reports cannot be archived.
Check the Email now to recipients checkbox to email the report.
In the text field, type in the recipient email addresses for the report.
Step 9
Click Deliver This Report to generate the report.
Viewing and Managing Archived Web Reports
The Web > Reporting> Archived Reports page lists the following: 
Reports that you schedule using the procedure in 
 
Reports that you generate using the procedure in 
To view a report, click the report names in the Report Title column. The Show drop-down menu filters 
the types of reports that are listed on the Archived Reports page. 
To locate a particular report if the list is long, filter the list by choosing a report type from the Show 
menu, or click a column heading to sort by that column. 
The appliance stores up to 12 instances of each scheduled report (up to 1000 reports). Archived reports 
are stored in the 
/periodic_reports
 directory on the appliance. Archived reports are deleted 
automatically. As new reports are added, older reports are removed to keep the number at 1000. The limit 
of 12 instances applies to each scheduled report with the same name and time range. 
Web Tracking 
Use the Web Tracking page to search for and view details about individual transactions or patterns of 
transactions that may be of concern. Depending on the services that your deployment uses, search in 
relevant tabs: