Hosted Email Security Ransomware Log Details

You can view this information by clicking the View link in the Details column on the Ransomware Summary screen.

Row

Description

Rule name

The name of the triggered policy rule that is used to analyze the message

Date/Time

The time the event occurred

Sender

The email address of the sender

Recipient

The recipient of the infected email

Subject

The subject of the email

Message ID

The message ID of the sender

Message size

The size of the message

Direction

The direction of the message

File name

The name of the file corrupted by the security risk

Violating URL

The restricted URL

Action/Result

The action taken or error result