Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 428
 
5-43
AsyncOS 9.5.x for Cisco Content Security Management Appliances User Guide
 
Chapter 5      Using Centralized Web Reporting and Tracking
  Web Tracking
Step 5
Click Search
Related Topics 
Malware Category Descriptions 
Web Appliance 
To filter by a specific Web appliance, click on the radio button next to 
Filter by Web Appliance and enter the Web appliance name in the text 
field. 
If you select Disable Filter, the search includes all Web Security 
appliances associated with the Security Management appliance. 
User Request
To filter by transactions that were actually initiated by the user, select 
Filter by User-Requested Transactions
Note: When you enable this filter, the search results include “best guess” 
transactions.
Table 5-13
Web Tracking Search Criteria on the Proxy Services Tab 
Option
Description 
Malware Type 
Description 
Adware
Adware encompasses all software executables and plug-ins that direct users 
towards products for sale. These programs may also change security settings 
making it impossible for users to make changes to their system settings. 
Browser Helper 
Object
A browser helper object is a browser plug-in that may perform a variety of 
functions related to serving advertisements or hijacking user settings.
Commercial System 
Monitor
A commercial system monitor is a piece of software with system monitor 
characteristics that can be obtained with a legitimate license through legal 
means.
Dialer
A dialer is a program that utilizes your modem or another type of Internet access 
to connect you to a phone line or a site that causes you to accrue long distance 
charges to which you did not provide your full consent.
Generic Spyware
Spyware is a type of malware installed on computers that collects small pieces 
of information about users without their knowledge.
Hijacker
A hijacker modifies system settings or any unwanted changes to a user’s system 
that may direct them to a website or run a program without a users consent.
Known Malicious 
and High-Risk Files 
These are files that were identified as threats by the Advanced Malware 
Protection file reputation service.