Understanding the Web Reporting Pages on the New Web Interface
The following table lists the reports under the Reports drop-down. available in the latest supported release of AsyncOS for Web Security Appliance s under the Reports drop-down of the web interface. For more information, see Using the Interactive Report Pages on the New Web Interface. If your Web Security Appliance s are running earlier releases of AsyncOS, not all of these reports are available.
Reports Drop-down Option |
Action |
---|---|
General Reports |
|
Overview Page |
The Overview page provides a synopsis of the activity on your Web Security Appliance s. It includes graphs and summary tables for the incoming and outgoing transactions. For more information, see the Overview Page. |
Application Visibility Page |
The Application Visibility page allows you to apply and view the controls that have been applied to a particular application types within the Security Management appliance and Web Security Appliance . For more information, see the Application Visibility Page. |
Layer 4 Traffic Monitor Page |
Allows you to view information about malware ports and malware sites that the L4 Traffic Monitor detected during the specified time range. For more information, see the Layer 4 Traffic Monitor Page. |
SOCKS Proxy Page |
Allows you to view data for SOCKS proxy transactions, including destinations and users. For more information, see the SOCKS Proxy Page. |
URL Categories Page |
The URL Categories page allows you to view the top URL Categories that are being visited, including:
For more information, see the URL Categories Page. |
Users Page |
The Users page provides several web tracking links that allow you to view web tracking information for individual users. From the Users page you can view how long a user, or users, on your system have spent on the internet, on a particular site or URL, and how much bandwidth that user is using. From the Users page you can click on an individual user in the interactive Users table to view more details for that specific user on the User Details page. The User Details page allows you to see specific information about a user that you have identified in the Users table on the Users page. From this page you can investigate individual user’s activity on your system. This page is particularly useful if you are running user-level investigations and need to find out, for example, what sites your users are visiting, what Malware threats they are encountering, what URL categories they are accessing, and how much time a specific user is spending at these sites. For more information, see the Users Page. For information on a specific user in your system, see the User Details Page (Web Reporting). |
Web Sites Page |
The Web Sites page allows you to view an overall aggregation of the activity that is happening on your managed appliances. From this page you can monitor high-risk web sites accessed during a specific time range. For more information, see the Web Sites Page. |
HTTPS Reports |
The HTTPS Reports report page is an overall aggregation of the HTTP/HTTPS traffic summary (transactions or bandwidth usage) on the managed appliances. For more information, see the HTTPS Reports Page |
Threat Reports |
|
Anti-Malware Page |
The Anti-Malware page allows you to view information about malware ports and malware sites that the anti-malware scanning engine(s) detected during the specified time range. The upper part of the report displays the number of connections for each of the top malware ports and web sites. The lower part of the report displays malware ports and sites detected. For more information, see the Anti-Malware Page. |
Advanced Malware Protection Page |
Advanced Malware Protection protects against zero-day and targeted file-based threats by obtaining the reputation of known files, analyzing behavior of certain files that are not yet known to the reputation service, and continuously evaluating emerging threats as new information becomes available, and notifying you about files that are determined to be threats after they have entered your network. For more information, see Advanced Malware Protection Page. |
Client Malware Risk Page |
The Client Malware Risk page is a security-related reporting page that can be used to identify individual client computers that may be connecting unusually frequently to malware sites. For more information, see the Client Malware Risks Page. |
Web Reputation Filters Page |
Allows you to view reporting on Web Reputation filtering for transactions during a specified time range. For more information, see the Web Reputation Filters Page. |
About Time Spent
The Time Spent column in various tables represents the amount of time a user spent on a web page. For purposes of investigating a user, the time spent by the user on each URL category. When tracking a URL, the time spent by each user on that specific URL.
Once a transaction event is tagged as ‘viewed’, that is, a user goes to a particular URL, a ‘Time Spent’ value will start to be calculated and added as a field in the web reporting table.
To calculate the time spent, AsyncOS assigns each active user with 60 seconds of time for activity during a minute. At the end of the minute, the time spent by each user is evenly distributed among the different domains the user visited. For example, if a user goes to four different domains in an active minute, the user is considered to have spent 15 seconds at each domain.
For the purposes of the time spent value, considering the following notes:
- An active user is defined as a user name or IP address that sends HTTP traffic through the appliance and has gone to a website that AsyncOS considers to be a “page view.”
- AsyncOS defines a page view as an HTTP request initiated by the user, as opposed to a request initiated by the client application. AsyncOS uses a heuristic algorithm to make a best effort guess to identify user page views.
Units are displayed in Hours:Minutes format.
Overview Page
The Overview report page provides a synopsis of the activity on your Web Security Appliance s. It includes graphs and summary tables for the incoming and outgoing transactions.
To view the Overview report page, choose Monitoring > Overview from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
At a high level the Overview report page shows you statistics about the URL and User usage, Web Proxy activity, and various transaction summaries. The transaction summaries gives you further trending details on, for example suspect transactions, and right across from this graph, how many of those suspect transactions are blocked and in what manner they are being blocked.
The lower half of the Overview report page is about usage. That is, the top URL categories being viewed, the top application types and categories that are being blocked, and the top users that are generating these blocks or warnings.
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Total Web Proxy Activity |
You can view the web proxy activity that is being reported by the Web Security Appliance s that are currently managed by the Security Management appliance. This section displays the actual number of transactions and the approximate date that the activity occurred in graphical format. You can also view the percentage of web proxy activity that are suspect, or clean proxy activity, including the total number of transactions. |
Suspect Transactions |
You can view the web transactions that have been labeled as suspect by the administrator in a graphical format. This section displays the actual number of transactions and the approximate date that the activity occurred, in graphical format. You can also view the percentage of blocked or warned transactions that are suspect. Additionally you can see the type of transactions that have been detected and blocked, and the actual number of times that this transaction was blocked. |
L4 Traffic Monitor Summary |
You can view any L4 traffic that is being reported by the Web Security Appliance s that are currently managed by the Security Management appliance, in graphical format. |
Top URL Categories: Total Transactions |
You can view the top URL categories that are being blocked, including the type of URL category and the actual number of times the specific type of category has been blocked in graphical format. The set of predefined URL categories is occasionally updated. For more information about the impact of these updates on report results, see URL Category Set Updates and Reports. |
Top Application Types: Total Transactions |
You can view the top application types that are being blocked, including the name of the actual application type and the number of times the specific application has been blocked, in graphical format. |
Top Malware Categories: Monitored or Blocked |
You can view all the Malware categories that have been detected, in graphical format. |
Top Users: Blocked or Warned Transactions |
You can view the actual users that are generating the blocked or warned transactions, in graphical format. Users can be displayed by IP address or by user name. |
Top Threat Categories: Blocked by WBRS |
You can view all the threat categories that have been blocked, in graphical format |
Application Visibility Page
Note |
For detailed information on Application Visibility, see the ‘Understanding Application Visibility and Control’ topic in User Guide for AsyncOS for Cisco Web Security Appliance . |
The Application Visibility report page allows you to apply controls to particular application types within the Security Management appliance and Web Security Appliance .
To view the Application Visibility report page, choose Monitoring > Application Visibility from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
The application control gives you more granular control over web traffic than just URL filtering, for example, as well as more control over the following types of applications, and application types:
-
Evasive applications, such as anonymizers and encrypted tunnels.
-
Collaboration applications, such as Cisco WebEx, Facebook, and instant messaging.
-
Resource intensive applications, such as streaming media.
Understanding the Difference between Application versus Application Types
It is crucial to understand the difference between an application and an application types so that you can control the applications involved for your reports.
-
Application Types. A category that contains one or more applications. For example, search engines is an application type that may contain search engines such as Google Search and Craigslist. Instant messaging is another application type category which may contain Yahoo Instant Messenger, or Cisco WebEx. Facebook is also an application type.
-
Applications. Particular applications that belong in an application type. For example, YouTube is an application in the Media application type.
-
Application behaviors. Particular actions or behaviors that users can accomplish within an application. For example, users can transfer files while using an application, such as Yahoo Messenger. Not all applications include application behaviors you can configure.
Note |
For detailed information on understanding how you can use Application Visibility and Control (AVC) engine to control Facebook activity, see the ‘Understanding Application Visibility and Control’ topic in User Guide for AsyncOS for Cisco Web Security Appliance s. |
From the Application Visibility page, you can view the following information:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Application Types by Total Transactions |
You can view the top application types that are being visited on the site in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. For example, instant messaging tools such as Yahoo Instant Messenger, Facebook, and Presentation application types. |
Top Applications by Blocked Transactions |
You can view the top application types that triggered a block action to occur per transaction in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. For example, a user has tried to start a certain application type, for example Google Talk or Yahoo Instant Messenger, and because of a specific policy that is in place, this triggered a block action. This application then gets listed in this graph as a transaction blocked or warning. |
Application Types Matched |
The Application Types Matched interactive table allows you to view granular details about the application types listed in the Top Applications Type by Total Transactions table. From the Applications column you can click on an application to view details. |
Applications Matched |
The Applications Matched interactive table shows all the application during a specified time range. Additionally, you can find a specific Application within the Application Matched section. In the text field at the bottom of this section, enter the specific Application name and click Find Application. |
Layer 4 Traffic Monitor Page
The Layer 4 Traffic Monitor report page displays information about malware ports and malware sites that the Layer 4 Traffic Monitors on your Web Security Appliance s have detected during the specified time range. It also displays IP addresses of clients that frequently encounter malware sites.
To view the Web Sites report page, choose Monitoring > Web Sites from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
The Layer 4 Traffic Monitor listens to network traffic that comes in over all ports on each Web Security Appliance and matches domain names and IP addresses against entries in its own database tables to determine whether to allow incoming and outgoing traffic.
You can use data in this report to determine whether to block a port or a site, or to investigate why a particular client IP address is connecting unusually frequently to a malware site (for example, this could be because the computer associated with that IP address is infected with malware that is trying to connect to a central command and control server.)
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Client IPs: Malware Connections Detected |
You can view the top IP addresses of computers in your organization that most frequently connect to malware sites, in graphical format. To customize the view of the chart, click on the chart. For more information, see Choosing Which Data to Chart. This chart is the same as the “Layer 4 Traffic Monitor: Malware Connections Detected” chart on the Client Malware Risks Page. |
Top Malware Sites: Malware Connections Detected |
You can view the top malware domains detected by the Layer 4 Traffic Monitor, in graphical format. To customize the view of the chart, click on the chart. For more information, see Choosing Which Data to Chart. |
Client Source IPs |
You can use the this interactive table to view the IP addresses of computers in your organization that frequently connect to malware sites. To include only data for a particular port, enter a port number into the box at the bottom of the table and click Filter by Client IP. You can use this feature to help determine which ports are used by malware that “calls home” to malware sites. To view details such as the port and destination domain of each connection, click an entry in the table. For example, if one particular client IP address has a high number of Malware Connections Blocked, click the number in that column to view a list of each blocked connection. The list is displayed as search results in the Layer 4 Traffic Monitor tab of the Web Tracking Search page. For more information about this list, see Searching for Transactions Processed by the Layer 4 Traffic Monitor. This chart is the same as the “Layer 4 Traffic Monitor: Malware Connections Detected” chart on the Client Malware Risks Page. |
Malware Ports |
You can use the this interactive table to view the ports on which the Layer 4 Traffic Monitor has most frequently detected malware. To view details, click an entry in the table. For example, click the number of Total Malware Connections Detected to view details of each connection on that port. The list is displayed as search results in the Layer 4 Traffic Monitor tab on the Web Tracking Search page. For more information about this list, see Searching for Transactions Processed by the Layer 4 Traffic Monitor. |
Malware Sites Detected |
You can use the this interactive table to view the domains on which the Layer 4 Traffic Monitor most frequently detects malware. To include only data for a particular port, enter a port number into the box at the bottom of the table and click Filter by Port. You can use this feature to help determine whether to block a site or a port. To view details, click an entry in the table. For example, click the number of Malware Connections Blocked to view the list of each blocked connection for a particular site. The list is displayed as search results in the Layer 4 Traffic Monitor tab on the Web Tracking Search page. For more information about this list, see Searching for Transactions Processed by the Layer 4 Traffic Monitor. |
Related Topics
SOCKS Proxy Page
The SOCKS Proxy report page allows you to view transactions processed through the SOCKS proxy, including information about destinations and users, in a graphical and tabular format.
To view the SOCKS Proxy report page, choose Monitoring > SOCKS Proxy from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
Note |
The destination shown in the report is the address that the SOCKS client (typically a browser) sends to the SOCKS proxy. |
To change SOCKS policy settings, see User Guide for AsyncOS for Cisco Web Security Appliance s.
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Destinations for SOCKS: Total Transactions |
You can view the top destinations detected by the SOCKS proxy, in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top Users for SOCKS: Malware Transactions |
You can view the top users detected by the SOCKS proxy, in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Destinations |
You can use the this interactive table to view the list of destination domains or IP addresses processed through SOCKS proxy. To include only data for a particular destination, enter a domain name or IP address into the box at the bottom of the table and click Find Domain or IP. |
Users |
You can use the this interactive table to view the list of users or IP addresses processed through SOCKS proxy. To include only data for a particular user, enter a user name or IP address into the box at the bottom of the table and click Find User ID / Client IP Address. |
Related Topics
URL Categories Page
The URL Categories report page can be used to view the URL categories of sites that users on your system are visiting.
To view the URL Categories report page, choose Monitoring > URL Categories from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
From the URL Categories page, you can view the following information:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top URL Categories: Total Transactions |
You can view the top URL Categories that are being visited on the site in a graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top URL Categories: Blocked and Warned Transactions |
You can view the top URL that triggered a block or warning action to occur per transaction in a graphical format. For example, a user went to a certain URL and because of a specific policy that is in place, this triggered a block action or a warning. This URL then gets listed in this graph as a transaction blocked or warning. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top Youtube Categories : Total Transactions |
You can view the top Youtube Categories that are being visited on the site in a graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top Youtube Categories : Blocked and Warned Transactions |
You can view the top Youtube URL that triggered a block or warning action to occur per transaction in a graphical format. For example, a user went to a certain Youtube URL and because of a specific policy that is in place, this triggered a block action or a warning. This Youtube URL then gets listed in this graph as a transaction blocked or warning. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
URL Categories Matched |
The URL Categories Matched interactive table shows the disposition of transactions by URL category during the specified time range, plus bandwidth used and time spent in each category. If there are a large number of unclassified URLs, see Reducing Uncategorized URLs. |
Reducing Uncategorized URLs
If the percentage of uncategorized URLs is higher than 15-20%, consider the following options:
-
For specific localized URLs, you can create custom URL categories and apply them to specific users or group policies. These transactions will then be included in “URL Filtering Bypassed” statistics instead. To do this, see information about custom URL categories AsyncOS for Cisco Web Security Appliance s User Guide.
-
For sites that you feel should be included in existing or other categories, see Reporting Misclassified and Uncategorized URLs.
URL Category Set Updates and Reports
The set of predefined URL categories may periodically be updated automatically on your Web Security Appliance .
When these updates occur, old category names will continue to appear in reports until the data associated with the older categories is too old to be included in reports. Report data generated after a URL category set update will use the new categories, so you may see both old and new categories in the same report.
Using The URL Categories Page in Conjunction with Other Reporting Pages
The URL Categories page can be used in conjunction with the Application Visibility Page, the User Details Page (Web Reporting)and the Users Page to investigate a particular user and the types of applications or websites that a particular user is trying to access.
For example, from the URL Categories Page, you can generate a high level report for Human Resources which details all the URL categories that are visited by the site. From the same page, you can gather further details in the URL Categories interactive table about the URL category ‘Streaming Media’. By clicking on the Streaming Media category link, you can view the specific URL Categories report page. This page not only displays the top users that are visiting streaming media sites (in the Top Users by Category for Total Transactions section), but also displays the domains that are visited (in the Domains Matched interactive table) such as YouTube.com or QuickPlay.com.
At this point, you are getting more and more granular information for a particular user. Now, let’s say this particular user stands out because of their usage, and you want to find out exactly what they are accessing. From here you can click on the user in the Users interactive table. This action takes you to the Users Page, where you can view the user trends for that user, and find out exactly what they have been doing on the web.
If you wanted to go further, you can now get down to web tracking details by clicking on Transactions Completed link in the interactive table. This displays the Searching for Transactions Processed by Web Proxy Services on the Web Tracking page where you can see the actual details about what dates the user accessed the sites, the full URL, the time spent on that URL, etc.
Reporting Misclassified and Uncategorized URLs
You can report misclassified and uncategorized URLs at the following URL:
https://talosintelligence.com/tickets.
Submissions are evaluated for inclusion in subsequent rule updates.
To check the status of submitted URLs, click the Status on Submitted URLs tab on this page.
HTTPS Reports Page
The HTTPS Reports report page is an overall aggregation of the HTTP/HTTPS traffic summary (transactions or bandwidth usage) on the managed appliances.
You can also view the summary of supported ciphers based on either client side connections or server side connections, for individual HTTP/HTTPS web traffic that passes through the managed appliance.
To view the HTTPS Reports report page, choose Monitoring > HTTPS Reports from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Changing the Time Range. |
Web Traffic Summary |
You can view the web traffic summary on the appliance in one of the following ways:
|
Trend: Web Traffic |
You can view the trend graph for the web traffic on the appliance based on the required time range in one of the following ways:
|
Ciphers |
You can view the summary of the ciphers in one of the following ways:
|
Users Page
The Users report page provides several links that allow you to view web reporting information for individual users.
To view the Users report page, choose Monitoring > Users from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
From the Users page you can view how long a user, or users, on your system have spent on the internet, on a particular site or URL, and how much bandwidth that user is using.
Note |
The maximum number of users on the Web Security Appliance that the Security Management appliance can support is 500. |
From the Users page, you can view the following information pertaining to the users on your system:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Users: Transactions Blocked |
You can view the top users, by either IP address or user name, and the number of transactions that have been blocked specific to that user, in graphical format. The user name or IP address can be made unrecognizable for reporting purposes. For more information on how to make user names unrecognizable in for this page or in scheduled reports, see the User Guide for AsyncOS for Cisco Content Security Management Appliances. The default setting is that all user names appear. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top Users: Bandwidth Used |
You can view the top users, by either IP address or user name, that are using the most bandwidth on the system, in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Users |
You can use this interactive table to search for a specific User ID or Client IP address. In the text field at the bottom of the User table, enter the specific User ID or Client IP address and click on Find User ID / Client IP Address. The IP address does not need to be an exact match to return results. You can click on a specific user to find more specific information. For more information, see the User Details Page (Web Reporting) |
Note |
To view user IDs instead of client IP addresses, you must set up your Security Management appliance to obtain user information from an LDAP server. |
User Details Page (Web Reporting)
The User Details page allows you to see specific information about a user that you have identified in the interactive table on the Users report page.
The User Details page allows you to investigate individual user’s activity on your system. This page is particularly useful if you are running user-level investigations and need to find out, for example, what sites your users are visiting, what Malware threats they are encountering, what URL categories they are accessing, and how much time a specific user is spending at these sites.
To display the User Details page for a specific user, click on a specific user from the Users interactive table on the Users report page.
From the User Details page, you can view the following information pertaining to an individual user on your system:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
URL Categories: Total Transactions |
You can view the specific URL Categories that a specific user is using, in graphical format. To customize the view of the chart, click on the chart. The set of predefined URL categories is occasionally updated. For more information about the impact of these updates on report results, see URL Category Set Updates and Reports. |
Trend: Total Transactions |
You can use this trend graph to view all the web transactions of a specific user. To customize the view of the chart, click on the chart. For example, this graph will indicate if there is a large spike in web traffic during certain hours of the day, and when those spikes occur. Using the Time Range drop-down list, you can expand this graph to see a more or less granular span of time that this user was on the web. |
URL Categories Matched |
The URL Categories Matched interactive table shows matched categories for both completed and blocked transactions. You can search for a specific URL Category in the text field at the bottom of the table and click Find URL Category. The category does not need to be an exact match. The set of predefined URL categories is occasionally updated. For more information about the impact of these updates on report results, see URL Category Set Updates and Reports. |
Domains Matched |
The Domains Matched interactive table shows domains or IP addresses that the user has accessed. You can also view the time spent on those categories, and various other information that you have set from the column view. You can search for a specific Domain or IP address in the text field at the bottom of the table and click Find Domain or IP. The domain or IP address does not need to be an exact match. |
Applications Matched |
The Applications Matched interactive table shows applications that a specific user is using. For example, if a user is accessing a site that requires use of a lot of Flash video, you will see the application type in the Application column. You can search for a specific application name in the text field at the bottom of the table and click Find Application. The name of the application does not need to be an exact match. |
Advanced Malware Protection Threats Detected |
The Advanced Malware Protection Threats Detected interactive table shows malware threat files that are detected by the Advanced Malware Protection engine. You can search for data on a specific SHA value of the malware threat file, in the text field at the bottom of the table and click Find malware Threat File SHA 256. The name of the application does not need to be an exact match. |
Malware Threats Detected |
The Malware Threats Detected interactive table shows the top Malware threats that a specific user is triggering. You can search for data on a specific malware threat name in the text field at the bottom of the table and click Find Malware Threat. The name of the Malware Threat does not need to be an exact match. |
Policies Matched |
The Policies Matched interactive table shows the policy groups that applied to this user when accessing the web. You can search for a specific policy name in the text field at the bottom of the table and click Find Policy. The name of the policy does not need to be an exact match. |
Note |
From Client Malware Risk Details table: The client reports sometimes show a user with an asterisk (*) at the end of the user name. For example, the Client report might show an entry for both “jsmith” and “jsmith*”. User names listed with an asterisk (*) indicate the user name provided by the user, but not confirmed by the authentication server. This happens when the authentication server was not available at the time and the appliance is configured to permit traffic when authentication service is unavailable. |
Web Sites Page
The Web Sites report page is an overall aggregation of the activity that is happening on the managed appliances. You can use this report page to monitor high-risk web sites accessed during a specific time range.
To view the Web Sites report page, choose Monitoring > Web Sites from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
From the Web Sites page, you can view the following information:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Domains: Total Transactions |
You can view the top domains that are being visited on the website in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top Domains: Transactions Blocked |
You can view the top domains that triggered a block action to occur per transaction in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. For example, a user went to a certain domain and because of a specific policy that I have in place, this triggered a block action. This domain is listed in this graph as a transaction blocked, and the domain site that triggered the block action is listed. |
Domains Matched |
You can use this interactive table to search for the domains that are that are being visited on the website. You can click on a specific domain to access more granular information. The Proxy Services tab on the Web Tracking page appears and you can see tracking information and why certain domains were blocked. When you click on a specific domain you can see the top users of that domain, the top transactions on that domain, the URL Categories matched and the Malware threats that have been detected. |
Advanced Malware Protection Page
Advanced Malware Protection protects against zero-day and targeted file-based threats by:
-
Obtaining the reputation of known files.
-
Analyzing behavior of certain files that are not yet known to the reputation service.
-
Evaluating emerging threats as new information becomes available, and notifying you about files that are determined to be threats after they have entered your network.
For more information on the file reputation filtering and file analysis, see the user guide or online help for AsyncOS for Web Security Appliance s.
The Advanced Malware Protection report page shows the following reporting views:
To view the Advanced Malware Protection report page, choose Monitoring > Advanced Malware Protection from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
Advanced Malware Protection - AMP Summary Page
The AMP Summary section of the Advanced Malware Protection report page shows file-based threats that were identified by the file reputation service.
To see the users who tried to access each SHA, and the filenames associated with that SHA-256, click a SHA-256 in the table.
You can click on the link in the Malware Threat Files interactive table to view all the instances of the file in Web Tracking that were encountered within the maximum available time range, regardless of the time range selected for the report.
If a file extracted from a compressed or archived file is malicious, only the SHA value of the compressed or archived file is included in the Advanced Malware Protection report.
You can use the AMP Summary section of the Advanced Malware Protection page to view:
-
The summary of files that are identified by file reputation service of the Advanced Malware Protection engine, in a graphical format.
-
The top malware threat files in a graphical format.
-
The top threat files based on the file types in a graphical format.
-
A trend graph for all the malware threat files based on the selected time range.
-
The Malware Threat Files interactive table that lists the top malware threat files.
-
The Files With Retrospective Verdict Change interactive table that lists the files processed by this appliance for which the verdict has changed since the transaction was processed. For more information about this situation, see the documentation for your Web Security Appliance .
In the case of multiple verdict changes for a single SHA-256, this report shows only the latest verdict, not the verdict history.
If multiple Web Security Appliance s have different verdict updates for the same file, the result with the latest time stamp is displayed.
You can click on a SHA-256 link to view web tracking results for all transactions that included this SHA-256 within the maximum available time range, regardless of the time range selected for the report.
Advanced Malware Protection - File Analysis Page
The File Analysis section of the Advanced Malware Protection report page shows the time and verdict (or interim verdict) for each file sent for analysis. The appliance checks for analysis results every 30 minutes.
For deployments with an on-premises Cisco AMP Malware Analytics Appliance: Files that are on the allowed list on the Cisco AMP Malware Analytics appliance show as "clean." For information about allowed listing, see the AMP Malware Analytics online help.
Drill down to view detailed analysis results, including the threat characteristics and score for each file.
You can also view additional details about an SHA directly on the server that performed the analysis by searching for the SHA or by clicking the Cisco AMP Malware Analytics link at the bottom of the file analysis details page.
If a file extracted from a compressed or archived file is sent for analysis, only the SHA value of the extracted file is included in the File Analysis report.
You can use the File Analysis section of the Advanced Malware Protection report page to view:
-
The number of files that are uploaded for file analysis by file analysis service of the Advanced Malware Protection engine.
-
A list of files that have completed file analysis requests.
-
A list of files that have pending file analysis requests.
Anti-Malware Page
The Anti-Malware report page is a security-related reporting page that reflects the results of scanning by your enabled scanning engines (Webroot, Sophos, McAfee, and/or Adaptive Scanning).
To view the Anti-Malware report page, choose Monitoring > Anti-Malware from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
You can use this page to help identify and monitor web-based malware threats.
Note |
To view data for malware found by L4 Traffic Monitoring, see Layer 4 Traffic Monitor Page |
From the Anti-Malware page, you can view the following information:
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Top Malware Categories |
You can view the top malware categories that are detected by a given category type, in graphical format. See Malware Category Descriptions for more information on valid Malware categories. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Top Malware Threats |
You can view the the top malware threats in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. |
Malware Categories |
The Malware Categories interactive table shows detailed information about particular malware categories that are displayed in the Top Malware Categories chart. Clicking on any of the links in the Malware Categories interactive table allows you to view more granular details about individual malware categories and where they are on the network. Exception: an Outbreak Heuristics link in the table lets you view a chart showing when transactions in this category occurred. See Malware Category Descriptions for more information on valid Malware categories. |
Malware Threats |
The Malware Threats interactive table shows detailed information about particular malware threats that are displayed in the Top Malware Threats section. Threats labeled “Outbreak” with a number are threats identified by the Adaptive Scanning feature independently of other scanning engines. |
Malware Category Report Page
Procedure
Step 1 |
Choose Reporting > Anti-Malware. |
Step 2 |
In the Malware Categories interactive table, click on a category in the Malware Category column. |
Malware Threat Report
The Malware Threat Report page shows clients at risk for a particular threat, displays a list of potentially infected clients, and links to the Client Detail page. The trend graph at the top of the report shows monitored and blocked transactions for a threat during the specified time range. The table at the bottom shows the actual number of monitored and blocked transactions for a threat during the specified time range.
To view this report, click a category in the Malware Category column of the Anti-Malware report page.
For additional information, click the Support Portal Malware Details link below the table.
Malware Category Descriptions
The Web Security Appliance can block the following types of malware:
Malware Type |
Description |
---|---|
Adware |
Adware encompasses all software executables and plug-ins that direct users towards products for sale. Some adware applications have separate processes that run concurrently and monitor each other, ensuring that the modifications are permanent. Some variants enable themselves to run each time the machine is started. These programs may also change security settings making it impossible for users to make changes to their browser search options, desktop, and other system settings. |
Browser Helper Object |
A browser helper object is browser plug-in that may perform a variety of functions related to serving advertisements or hijacking user settings. |
Commercial System Monitor |
A commercial system monitor is a piece of software with system monitor characteristics that can be obtained with a legitimate license through legal means. |
Dialer |
A dialer is a program that utilizes your modem or another type of Internet access to connect you to a phone line or a site that causes you to accrue long distance charges to which you did not provide your full, meaningful, and informed consent. |
Generic Spyware |
Spyware is a type of malware installed on computers that collects small pieces of information about users without their knowledge. |
Hijacker |
A hijacker modifies system settings or any unwanted changes to a user’s system that may direct them to a website or run a program without a user’s full, meaningful, and informed consent. |
Other Malware |
This category is used to catch all other malware and suspicious behavior that does not exactly fit in one of the other defined categories. |
Outbreak Heuristics |
This category represents malware found by Adaptive Scanning independently of the other anti-malware engines. |
Phishing URL |
A phishing URL is displayed in the browser address bar. In some cases, it involves the use of domain names and resembles those of legitimate domains. Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal personal identity data and financial account credentials. |
PUA |
Potentially Unwanted Application. A PUA is an application that is not malicious, but which may be considered to be undesirable. |
System Monitor |
A system monitor encompasses any software that performs one of the following actions: Overtly or covertly records system processes and/or user action. Makes those records available for retrieval and review at a later time. |
Trojan Downloader |
A trojan downloader is a Trojan that, after installation, contacts a remote host/site and installs packages or affiliates from the remote host. These installations usually occur without the user’s knowledge. Additionally, a Trojan Downloader’s payload may differ from installation to installation since it obtains downloading instructions from the remote host/site. |
Trojan Horse |
A trojan horse is a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves. |
Trojan Phisher |
A trojan phisher may sit on an infected computer waiting for a specific web page to be visited or may scan the infected machine looking for user names and passwords for bank sites, auction sites, or online payment sites. |
Virus |
A virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. |
Worm |
A worm is program or algorithm that replicates itself over a computer network and usually performs malicious actions. |
Client Malware Risks Page
The Reporting > Client Malware Risk page is a security-related reporting page that can be used to monitor client malware risk activity. The Client Malware Risk page also lists client IP addresses involved in frequent malware connections, as identified by the L4 Traffic Monitor (L4TM).
Section |
Description |
---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
Web Proxy: Top Clients Monitored or Blocked |
This chart displays the top ten users that have encountered a malware risk. |
L4 Traffic Monitor: Malware Connections Detected |
This chart displays the IP addresses of the computers in your organization that most frequently connect to malware sites. |
Web Proxy: Client Malware Risk |
The Web Proxy: Client Malware Risk interactive table shows detailed information about particular clients that are displayed in the Web Proxy: Top Clients by Malware Risk section. |
L4 Traffic Monitor: Clients by Malware Risk |
The L4 Traffic Monitor: Clients by Malware Risk interactive table displays IP addresses of computers in your organization that frequently connect to malware sites. |
Web Reputation Filters Page
You can use the Web Reputation Filters report page to view the results of your set Web Reputation filters for transactions during a specified time range.
To view the Web Reputation Filters report page, choose Monitoring > Web Reputation Filters from the Reports drop-down. For more information, see Using the Interactive Report Pages on the New Web Interface.
What are Web Reputation Filters?
Web Reputation Filters analyze web server behavior and assign a reputation score to a URL to determine the likelihood that it contains URL-based malware. It helps protect against URL-based malware that threatens end-user privacy and sensitive corporate information. The Web Security Appliance uses URL reputation scores to identify suspicious activity and stop malware attacks before they occur. You can use Web Reputation Filters with both Access and Decryption Policies.
Web Reputation Filters use statistical data to assess the reliability of Internet domains and score the reputation of URLs. Data such as how long a specific domain has been registered, or where a web site is hosted, or whether a web server is using a dynamic IP address is used to judge the trustworthiness of a given URL.
The web reputation calculation associates a URL with network parameters to determine the probability that malware exists. The aggregate probability that malware exists is then mapped to a Web Reputation Score between -10 and +10, with +10 being the least likely to contain malware.
Example parameters include the following:
-
URL categorization data
-
Presence of downloadable code
-
Presence of long, obfuscated End-User License Agreements (EULAs)
-
Global volume and changes in volume
-
Network owner information
-
History of a URL
-
Age of a URL
-
Presence on any block lists
-
Presence on any allow lists
-
URL typos of popular domains
-
Domain registrar information
-
IP address information
For more information on Web Reputation Filtering, see ‘Web Reputation Filters’ in the User Guide for AsyncOS for Web Security Appliance s.
From the Web Reputation Filters page, you can view the following information:
Section |
Description |
||
---|---|---|---|
Time Range (drop-down list) |
Choose the time range for your report. For more information, see the Choosing a Time Range for Reports. |
||
Web Reputation Actions (Trend) |
You can view the total number of web reputation actions against the time specified, in graphical format. From this you can see potential trends over time for web reputation actions. |
||
Web Reputation Actions (Volume) |
You can view the web reputation action volume in percentages by transactions. |
||
Web Reputation Threat Types Blocked by WBRS |
You can view the types of threats found in transactions that were blocked by Web Reputation filtering, in graphical format.
|
||
Threat Types Detected in Other Transactions |
You can view the type of threats found in transactions that were not blocked by Web Reputation filtering, in graphical format. To customize the view of the chart, click on the chart. For more information, see (Web Reports Only) Choosing Which Data to Chart. Reasons these threats might not have been blocked include:
|
||
Web Reputation Actions (Breakdown by Score) |
If Adaptive Scanning is not enabled, this interactive table displays the Web Reputation scores broken down for each action. |
||
Threat Categories Matched |
You can view the threat categories matched, in graphical format. |
Adjusting Web Reputation Settings
Based on your report results, you may want to adjust the configured web reputation settings, for example adjust the threshold scores or enable or disable Adaptive Scanning. For specific information about configuring web reputation settings, see User Guide for AsyncOS for Cisco Web Security Appliance s.