Guia de l'usuari d'anàlisi de xarxa segura de CISCO WSA
CISCO WSA Secure Network Analytics User Guide Introduction To collect user information from your network proxy servers for the Cisco Secure Network Analytics (formerly Stealthwatch) Proxy Log, you need to configure the proxy server logs. The Flow Collector receives the…