Header
|
Description
|
||
---|---|---|---|
![]() |
Investigate the email message to learn more about potential
threats.
For details, see Investigating a Detected Message.
|
||
Received
|
View the date and time that the suspicious email message first
passes TippingPoint Advanced Threat Protection for Email.
|
||
Risk Level
|
View the level of potential danger exhibited in a suspicious
email message. For details, see Detected Risk.
|
||
Recipients
|
View the detected message recipient email addresses.
|
||
Sender
|
View the sending email address of the detected message.
|
||
Email Subject
|
View the email subject of the suspicious email message.
|
||
![]() |
View the number of email messages with embedded malicious
links.
|
||
![]() |
View the number of email messages with malicious file
attachments.
|
||
Threat
|
View the name and classification of the discovered threat. For
details, see Threat Type Classifications.
|
||
Action
|
View the final result after scanning and analyzing the email
message. The result is the executed policy action.
|
![]() |
NoteSearch filters do not accept wildcards. TippingPoint Advanced Threat Protection for Email
uses fuzzy logic to match search criteria to email message data.
|
Filter
|
Description
|
||
---|---|---|---|
Risk level
|
Select the email message risk level. For details about risk
levels, see Email Message Risk Levels.
|
||
Action
|
Select an action from the list.
For details, see Configuring the Actions.
|
||
Recipients
|
Specify recipient email addresses. Use a semicolon to separate
multiple recipients.
|
||
Period
|
Select a predefined time range or specify a custom range.
|
||
Sender
|
Specify the sender email address. Only one address is
allowed.
|
||
Links
|
Specify a URL.
|
||
Threat type
|
Select a threat type from the list. For details, see
Threat Type Classifications.
|
||
Message ID
|
Specify the unique message ID.
Example: 950124.162336@example.com
|
||
Source IP
|
Specify the MTA IP address nearest to the email sender. The
source IP is the IP address of the attack source, compromised MTA, or a botnet
with mail relay capabilities.
A compromised MTA is usually a third-party open mail relay used by attackers to send
malicious email messages or spam without detection.
|
||
Threat name
|
Specify the threat name provided by Trend Micro. The dashboard
widgets and the tab provide information about threat names.
For information about threat discovery capabilities, see Scanning / Analysis.
|
||
Subject
|
Specify the email message subject.
|
||
Attachment
|
Specify attachment file names. Use a semicolon to separate
multiple file names.
|
||
Password-protected file
|
Select email messages that contain a password-protected file.
|