Cisco Cisco Email Security Appliance X1070 用户指南
28-34
Cisco AsyncOS 9.1 for Email User Guide
Chapter 28 Using Email Security Monitor
Email Security Monitor Pages
•
The CSV download returns the rows of data in the table ordered by timestamp and key. You can
perform further sorting in a separate step such as via a spreadsheet application.
perform further sorting in a separate step such as via a spreadsheet application.
•
The first row contains column headers that match the display names shown in the report. Note that
timestamps (see
timestamps (see
) and keys (see
) also appear.
Related Topics
•
•
•
•
•
•
Sample URL
http://example.com/monitor/content_filters?format=csv&sort_col_ss_0_0_0=MAIL_CONTENT_FILT
ER_INCOMING.RECIPIENTS_MATCHED§ion=ss_0_0_0&date_range=current_day&sort_order
_ss_0_0_0=desc&report_def_id=mga_content_filters
ER_INCOMING.RECIPIENTS_MATCHED§ion=ss_0_0_0&date_range=current_day&sort_order
_ss_0_0_0=desc&report_def_id=mga_content_filters
Adding Basic HTTP Authentication credentials
To specify basic HTTP Authentication credentials to the URL:
http://example.com/monitor/
becomes:
http://username:password@example.com/monitor/
File Format
The downloaded file is in CSV format and has a .csv file extension. The file header has a default
filename, which starts with the name of the report, then the section of the report.
filename, which starts with the name of the report, then the section of the report.
Timestamps
Exports that stream data show begin and end timestamps for each raw “interval” of time. Two begin and
two end timestamps are provided — one in numeric format and the other in human-readable string
format. The timestamps are in GMT time, which should make log aggregation easier if you have
appliances in multiple time zones.
two end timestamps are provided — one in numeric format and the other in human-readable string
format. The timestamps are in GMT time, which should make log aggregation easier if you have
appliances in multiple time zones.
Note that in some rare cases where the data has been merged with data from other sources, the export
file does not include timestamps. For example, the Outbreak Details export merges report data with
Threat Operations Center (TOC) data, making timestamps irrelevant because there are no intervals.
file does not include timestamps. For example, the Outbreak Details export merges report data with
Threat Operations Center (TOC) data, making timestamps irrelevant because there are no intervals.
Keys
Exports also include the report table key(s), even in cases where the keys are not visible in the report. In
cases where a key is shown, the display name shown in the report is used as the column header.
Otherwise, a column header such as “key0,” “key1,” etc. is shown.
cases where a key is shown, the display name shown in the report is used as the column header.
Otherwise, a column header such as “key0,” “key1,” etc. is shown.