Header
|
Description
|
||
---|---|---|---|
![]() |
Investigate the email message to learn more about potential
threats.
For details, see Investigating a Quarantined Email Message.
|
||
Received
|
View the date and time that the suspicious email message first
passes TippingPoint Advanced Threat Protection for Email.
|
||
Risk Level
|
View the level of potential danger exhibited in a suspicious
email message. For details, see Detected Risk.
|
||
Recipients
|
View the detected message recipient email addresses.
|
||
Sender
|
View the sending email address of the detected message.
|
||
Email Subject
|
View the email subject of the suspicious email message.
|
||
![]() |
View the number of email messages with embedded malicious
links.
|
||
![]() |
View the number of email messages with malicious file
attachments.
|
||
Threat
|
View the name and classification of the discovered threat. For
details, see Threat Type Classifications.
|
||
Password-protected attachment
|
Select to only show quarantined messages that have
password-protected attachments.
|
![]() |
NoteSearch filters do not accept wildcards. TippingPoint Advanced Threat Protection for Email
uses fuzzy logic to match search criteria to email message data.
|
Filter
|
Description
|
||
---|---|---|---|
Risk level
|
Select the email message risk level. For details about risk
levels, see Email Message Risk Levels.
|
||
Recipients
|
Specify recipient email addresses. Use a semicolon to separate
multiple recipients.
|
||
Period
|
Select a predefined time range or specify a custom range.
|
||
Sender
|
Specify the sender email address. Only one address is
allowed.
|
||
Links
|
Specify a URL.
|
||
Threat type
|
Select a threat type from the list. For details, see
Threat Type Classifications.
|
||
Message ID
|
Specify the unique message ID.
Example: 950124.162336@example.com
|
||
Source IP
|
Specify the MTA IP address nearest to the email sender. The
source IP is the IP address of the attack source, compromised MTA, or a botnet
with mail relay capabilities.
A compromised MTA is usually a third-party open mail relay used by attackers to send
malicious email messages or spam without detection.
|
||
Threat name
|
Specify the threat name provided by Trend Micro. The dashboard
widgets and the tab provide information about threat names.
|
||
Subject
|
Specify the email message subject.
|
||
Attachment
|
Specify attachment file names. Use a semicolon to separate
multiple file names.
|
||
Password-protected attachment
|
Check if the attachement is password-protected.
|
![]() |
NoteQuarantined messages purge based on the settings configured on the
Storage Maintenance screen.
For details, see Configuring Storage Maintenance.
|
Field
|
Description
|
---|---|
Overview
|
View the message ID, recipients, and source IP address of the
email message to understand where the message came from and other tracking
information.
|
Attachments
|
Get information about any files attached to the email message,
including the file name, password, file type, risk level, the scan engine that
identified the threat, and the name of detected threats.
|
Links
|
Get information about any embedded suspicious URLs that appeared
in the email message, including the URL, site category, risk level, the scan engine
that identified the threat, and the name of detected threats.
|
Message characteristics
|
Get information about any social engineering attack related characteristics that were
detected in the email message, including the mail server reputation, gaps between
transits, inconsistent recipient accounts, and forged sender addresses or unexpected
relay servers.
|
Analysis Reports
|
View and in-depth PDF or HTML analysis report about this email
message, including suspicious attachments or links, notable characteristics,
callback destinations, and dropped or downloaded files.
|
Forensics
|
Get more information about this email message for further
analysis. Download the email message or safely download the email message as an
image.
|
Message Source
|
View the email message header content.
|