Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 413
 
5-50
Cisco IronPort AsyncOS 8.0 for Security Management User Guide
Chapter 5      Using Centralized Web Reporting and Tracking
From the Reports by User Location page, you can view the following information:
From the Reports by User Location page you can generate reports showing the activity of local and 
remote users. This allows you to easily compare local and remote activities of your users.
Tip
To customize your view of this report, see 
.
Note
You can generate a scheduled report for information on the Reports by User Location page. For 
information on scheduling a report, see the 
Web Tracking 
Use the Web Tracking page to search for and view details about individual transactions or patterns of 
transactions that may be of concern. Depending on the services that your deployment uses, search in 
relevant tabs: 
  •
  •
  •
Table 5-14
Details on the Web > Reporting > Reports by User Location Page
Section
Description
Time Range (drop-down list)
A drop-down list that can range from a day to 90 days or a custom 
range. For more information on time ranges and customizing this 
for your needs, see th
Total Web Proxy Activity: Remote Users
This section displays, in graph format, the activity of your remote 
users (vertical) over the specified time (horizontal). 
Web Proxy Summary
This section displays a summary of the activities of the local and 
remote users on your system.
Total Web Proxy Activity: Local Users
This section displays, in graph format, the activity of your remote 
users (vertical) over the specified time (horizontal). 
Suspect Transactions Detected: Remote 
Users
This section displays, in graph format, the suspect transactions 
that have been detected due to access policies that you have 
defined for your remote users (vertical) over the specified time 
(horizontal). 
Suspect Transactions Summary
This section displays a summary of suspected transactions of the 
remote users on your system.
Suspect Transactions Detected: Local 
Users
This section displays, in graph format, the suspect transactions 
that have been detected due to access policies that you have 
defined for your remote users (vertical) over the specified time 
(horizontal). 
Suspect Transactions Summary
This section displays a summary of suspected transactions of the 
local users on your system.