Cisco Systems OL-16647-01 Network Router User Manual


  Open as PDF
of 1230
 
47-3
Cisco ASDM User Guide
OL-16647-01
Chapter 47 Monitoring Trend Micro Content Security
Live Security Events
Live Security Events Log
The Live Log dialog box lets you view real-time security event messages that are received from the CSC
SSM. You can filter security event messages based on text you specify.
Fields
Filter By: Choose one of the following from the drop-down list.
Show All—Displays all messages.
Filter by Text—Lets you filter the messages to view based on text you enter.
Filter—Click to filter the messages.
Find Messages—Searches the messages based on the text you enter.
Text—Enter the text to search for in the messages log.
Find—Click to find the next entry that matches the text you typed in this field.
Columns—Displays the following, read-only columns:
Time—Displays the time an event occurred.
Source—Displays the IP address or hostname from which the threat came.
Threat/Filter—Displays the type of threat or, in the case of a URL filter event, the filter that
triggered the event.
Subject/File/URL—Displays the subject of e-mails that contain a threat, the names of FTP files
that contain a threat, or blocked or filtered URLs.
Receiver/Host—Displays the recipient of e-mails that contain a threat or the IP address or
hostname of a threatened node.
Sender—Displays the sender of e-mails containing a threat.
Content Action—Displays the action taken upon the content of a message, such as cleaning
attachments or deleting attachments.
Msg Action—Displays the action taken on a message, such as delivering it unchanged,
delivering it after deleting the attachments, or delivering it after cleaning the attachments.
Pause—Click to pause the scrolling of the Live Security Events log.
Save—Click to save the log to a file on your PC.
Clear Display—Click to remove the list of messages.
Close—Click to close the pane and return to the previous screen.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode Security Context
Routed Transparent Single
Multiple
Context System
• • • •