|
Header
|
Description
|
||
|---|---|---|---|
|
|
Investigate the email message to learn more about potential
threats.
For details, see Investigating a Detected Message.
|
||
|
Detected
|
View the date and time that the suspicious email message was
first detected in TippingPoint Advanced
Threat Protection for Email.
|
||
|
Risk Level
|
View the level of potential danger exhibited in a suspicious
email message. For details, see Detected Risk.
|
||
|
Recipients
|
View the detected message recipient email addresses.
|
||
|
To
|
View the primary recipient email address in the email header.
|
||
|
Sender
|
View the sending email address of the detected message.
|
||
|
From
|
View the author email address in the email header.
|
||
|
Email Subject
|
View the email subject of the suspicious email message.
|
||
|
|
View the number of email messages with embedded malicious
links.
|
||
|
|
View the number of email messages with malicious file
attachments.
|
||
|
Threat
|
View the name and classification of the discovered threat. For
details, see Threat Type Classifications.
|
||
|
Action
|
View the final result after scanning and analyzing the email
message. The result is the executed policy action.
|
NoteSearch filters do not accept wildcards. TippingPoint Advanced
Threat Protection for Email uses fuzzy logic to match
search criteria to email message data.
|
|
Filter
|
Description
|
||
|---|---|---|---|
|
Risk level
|
Select All or the email message risk
level.
|
||
|
Action
|
Select an action from the list.
For details, see Configuring the Actions.
|
||
|
Recipients
|
Specify one or more recipient email addresses. Use a semicolon
to separate multiple recipients.
|
||
|
Period
|
Select a predefined time range or specify a custom range.
|
|
Filter
|
Description
|
||
|---|---|---|---|
|
Sender
|
Specify the sender email address.
|
||
|
From
|
Specify the author email address in the email header.
|
||
|
To
|
Specify a primary recipient email address in the email header.
|
||
|
Links
|
Specify a URL.
|
||
|
Threat type
|
Select a threat type from the list. For details, see
Threat Type Classifications.
|
||
|
Message ID
|
Specify the unique message ID.
Example:
20160603021433.F0304120A7A@example.com
|
||
|
Source IP
|
Specify the MTA IP address nearest to the email sender. The
source IP is the IP address of the attack source, compromised MTA, or a botnet
with mail relay capabilities.
A compromised MTA is usually a third-party open mail relay used by attackers to send
malicious email messages or spam without detection.
|
||
|
Threat name
|
Specify the threat name provided by Trend Micro. The dashboard widgets and
the tab provide information about threat names.
For information about threat discovery capabilities, see Scanning / Analysis.
|
||
|
Subject
|
Specify the email message subject.
|
||
|
Attachment
|
Specify an attachment file name.
|
||
|
Password-protected attachment
|
Select email messages that contain a password-protected
file.
|