Provides a summary of suspicious threat detections
                  from a specific sender. Example: name of the sender, summary information
                  about the recipient and rules/violations, the total number of suspicious
                  threats on the network
Suspicious Sender Summary Data View
| Data | Description | 
| Sender | Displays the email address for the source
                              of policy/rule violations. | 
| Unique Policies/Rules | Displays the number of unique policies/rules
                              the source computer violates. Example: A managed product detects
                              10 policy violation instances of the same policy on 2 computers. Unique
                              Policies/Rules = 1 | 
| Unique Recipients | Displays the number of unique email message
                              recipients receiving content that violate managed product suspicious
                              threat policies. Example: A managed product detects 10 suspicious
                              threat violation instances of the same policy on 2 computers. Unique
                              Recipients = 2 | 
| Detections | Displays the total number of policy/rule violations
                              managed products detect. Example: A managed product detects
                              10 violation instances of the same type on one computer. Detections
                              = 10 | 
 
		