Cisco ASA 5505 Configuration Manual page 1164

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Monitoring the CSC SSM
Click View to display the Live Security Events Log dialog box. You can pause incoming messages, clear
Step 2
the message window, and save event messages. You can also search messages for specific text.
What to Do Next
See the
Live Security Events Log
To view live security events messages that are received from the CSC SSM, perform the following steps:
Step 1
To filter security event messages from the Filter By drop-down list, choose one of the following:
To use the Latest CSC Security Events pane, in which all columns are display-only, choose one of the
Step 2
following options:
To search security event messages based on the text that you enter, choose one of the following:
Step 3
To pause scrolling of the Latest CSC Security Events pane, click Pause. To resume scrolling of the Latest
Step 4
CSC Security Events pane, click Resume.
To save the log to a file on your PC, click Save.
Step 5
To clear the list of messages shown, click Clear Display.
Step 6
To close the pane and return to the previous one, click Close.
Step 7
Cisco ASA 5500 Series Configuration Guide using ASDM
55-12
"Live Security Events Log" section on page
Filter by Text, type the text, then click Filter.
Show All, to display all messages or remove the filter.
The time an event occurred.
The IP address or hostname from which the threat came.
The type of threat, or the security policy that determines event handling, or in the case of a URL
filtering event, the filter that triggered the event.
The subject of e-mails that include a threat, or the names of FTP files that include a threat, or blocked
or filtered URLs.
The recipient of e-mails that include a threat, or the IP address or hostname of a threatened node, or
the IP address of a threatened client.
The type of event (such as Web, Mail, or FTP), or the name of a user or group for HTTP or FTP
events, which include a threat.
The action taken upon the content of a message, such as cleaning attachments or deleting
attachments.
The action taken on a message, such as delivering it unchanged, delivering it after deleting the
attachments, or delivering it after cleaning the attachments.
In the Text field, enter the text to search for in the security event messages log, then click Find
Messages.
To find the next entry that matches the text you typed in this field, click Find.
Chapter 55
Configuring the Content Security and Control Application on the CSC SSM
55-12.
OL-20339-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents