Provides a summary of suspicious threat detections
                  from a specific source. Example: name of the source, summary information
                  about the destination and rules/violations, the total number of
                  suspicious threats on the network
Suspicious Source Summary Data View
| Data | Description | 
| Source IP | Displays the IP addresses of sources where suspicious
                              threats originate. | 
| Unique Policies/Rules | Displays the number of unique policies/rules
                              the source computer violates. Example: A managed product detects
                              10 policy violation instances of the same policy on 2 computers. Unique
                              Policies/Rules = 1 | 
| Unique Endpoints | Displays the number of unique computers affected
                              by the suspicious threat. Example: A managed product detects
                              10 suspicious threat instances of the same type on 2 computers. Unique
                              Endpoints = 2 | 
| Detections | Displays the total number of policy/rule violations
                              managed products detect. Example: A managed product detects
                              10 violation instances of the same type on one computer. Detections
                              = 10 | 
 
		