To customize the display, apply the following display options and search filters:
Filter Option |
Description |
|
---|---|---|
Risk level |
Filter options include the following risk level settings: |
|
High |
Displays high-risk email messages |
|
Medium |
Displays medium-risk email messages |
|
Low |
Displays low-risk email messages |
|
Unavailable |
Displays spam/graymail messages and email messages with content violation |
|
Unrated |
Displays email messages where the email format was invalid or that contained unscannable attachments or links |
|
All |
Displays all email messages |
|
Period |
Last 24 hours |
|
Last 7 days |
||
last 14 days |
||
Last 30 days |
||
Last 60 days |
||
Custom range |
||
Monitored domain |
Select domains from which email messages should be displayed |
|
Quarantine Reason |
Filter options include the following quarantine reasons: |
|
All |
Displays all email messages |
|
Content violation |
Messages with content that matches a content filtering rule |
|
DLP incident |
Messages that contain Data Loss Prevention (DLP) policy violations |
|
Malformed |
Messages that cannot be opened for processing |
|
Spam detection |
Messages that are detected as spam/graymail |
|
Threat detection |
Messages that are detected to contain malware |
|
Unknown |
Messages with unknown threats |
|
Unscannable |
Messages that are not scannable |
|
Unsuccessful decryption |
Messages that cannot be decrypted. |
|
Unsuccessful encryption |
Messages that cannot be encrypted. |
|
Virtual Analyzer error |
Messages that are not analyzed because of an unexpected error in Virtual Analyzer (for example, processing time-out) |
|
Virtual Analyzer time-out |
Messages that are not analyzed because of processing time-out in Virtual Analyzer |
|
Threat type |
Filter options include the following threat type classifications: |
|
All |
Displays all email messages |
|
Targeted malware |
Malware made to look like they come from someone a user expects to receive email messages from, possibly a boss or colleague |
|
Malware |
Malicious software used by attackers to disrupt, control, steal, cause data loss, spy upon, or gain unauthorized access to computer systems |
|
Malicious URL |
A hyperlink embedded in an email message that links to a known malicious web site |
|
Suspicious File |
A file that exhibits malicious characteristics |
|
Suspicious URL |
A hyperlink embedded in an email message that links to an unknown malicious website |
|
Phishing |
Email messages that seek to fool users into divulging private information by redirecting users to legitimate-looking web sites |
|
Spam/Graymail |
Unsolicited spam email messages, often of a commercial nature, sent indiscriminately to multiple individuals Graymail refers to solicited bulk email messages that are not spam |
|
Content violation |
Content that you deem inappropriate, such as personal communication or large attachments |
|
DLP incident |
Policy violations that can lead to data loss |
|
Basic search |
Type a case-insensitive keyword in the basic search filed to search a partial sender or recipient match. |
|
Advanced Search |
Search by user-defined criteria sets. Each set includes one or more of the following:
|