The following table explains the tokens available for alert notifications. Use the table to customize your alert notifications with message tokens.
Not every alert notification can accept every message token. Review the alert's parameter specifications before using a message token. For details, see Alert Notification Parameters.
Token |
Description |
Notes |
---|---|---|
%Account% |
The user name of the account that Deep Discovery Email Inspector locks |
Where allowed:
Examples:
|
%Action% |
The action that Deep Discovery Email Inspector took on the processed message |
Where allowed:
Examples:
|
%AveSandboxProc% |
The average time in minutes it takes to queue and analyze messages in the past hour |
Where allowed:
Examples:
|
%ComponentList% |
The list of components. |
Where allowed:
Examples:
|
%ConsoleURL% |
The Deep Discovery Email Inspector management console URL. |
Where allowed:
Example:
|
%CPUThreshold% |
The maximum CPU usage as a percentage allowed before Deep Discovery Email Inspector sends an alert notification |
Where allowed:
Examples:
|
%CPUUsage% |
The total CPU utilization as a percentage |
Where allowed:
Examples:
|
%DateTime% |
The date and time that the Deep Discovery Email Inspector received the email message |
Where allowed:
Examples:
|
%DaysBeforeExpirationATD% |
The number of days before the product license for Advanced Threat Protection expires |
Where allowed:
Examples:
|
%DaysBeforeExpirationSEG% |
The number of days before the product license for Gateway Module expires |
Where allowed:
Examples:
|
%DeferredQueue% |
The number of email messages in the deferred queue waiting for Deep Discovery Email Inspector to process. |
Where allowed:
Example:
|
%DeliveryQueue% |
The number of email messages in the delivery queue waiting for Deep Discovery Email Inspector to process. |
Where allowed:
Examples:
|
%DetectionCount% |
The number of messages detected with suspicious characteristics during the specified period of time |
Where allowed:
Examples:
|
%DetectionThreshold% |
The maximum number of messages detected to have suspicious characteristics before Deep Discovery Email Inspector sends an alert notification |
Where allowed:
Examples:
|
%DeviceIP% |
The IP address of the Deep Discovery Email Inspector appliance |
Where allowed:
Example:
|
%DeviceName% |
The host name of the Deep Discovery Email Inspector appliance |
Where allowed:
Example:
|
%DiagnosisTip% |
Recommendations on how to resolve the issue |
Where allowed:
|
%DiskSpace% |
The lowest amount of disk space in GB before Deep Discovery Email Inspector send an alert notification |
Where allowed:
Examples:
|
%ExpirationDateATD% |
The day the product license for Advanced Threat Protection expires |
Where allowed:
Examples:
|
%ExpirationDateSEG% |
The day the product license for Gateway Module expires |
Where allowed:
Examples:
|
%Interval% |
The frequency that Deep Discovery Email Inspector checks the message processing volume in minutes |
Where allowed:
Examples:
|
%LicenseStatusATD% |
The current status of the product license for Advanced Threat Protection |
Where allowed:
Examples:
For details, see Product License Status. |
%LicenseStatusSEG% |
The current status of the product license for Gateway Module |
Where allowed:
Examples:
For details, see Product License Status. |
%LicenseTypeATD% |
The Advanced Threat Protection product license type |
Where allowed:
Examples:
|
%LicenseTypeSEG% |
The Gateway Module product license type |
Where allowed:
Examples:
|
%MemoryThreshold% |
The maximum memory usage as a percentage allowed before Deep Discovery Email Inspector sends an alert notification. |
Where allowed:
Example: 90 |
%MemoryUsage% |
The total memory utilization as a percentage. |
Where allowed:
Example: 90 |
%MessageList% |
The list of detected messages, which includes the risk level, threat name, action taken, message ID, recipients, sender, recipient, subject, top three most risky attachment details, and when the message was received. This token also provides the names of detected threats for the following alert notifications:
|
Where allowed:
Examples:
|
%MTAList% |
The list of unreachable MTAs. Each MTA appears as an IP address and the port number. |
Where allowed:
Examples:
|
%ProcessingCount% |
The total number of processed messages over the specified period of time |
Where allowed:
Examples:
|
%ProcessingThreshold% |
The maximum number of processed messages during the specified time frame before Deep Discovery Email Inspector sends an alert notification |
Where allowed:
Examples:
|
%QueueThreshold% |
The maximum number of messages in the delivery queue before Deep Discovery Email Inspector sends an alert notification |
Where allowed:
Examples:
|
%SandboxProcThreshold% |
The maximum amount of time allocated for average sandbox processing before Deep Discovery Email Inspector sends an alert notification |
Where allowed:
Examples:
|
%SandboxQueue% |
The email message count in the sandbox queue waiting to be analyzed by Virtual Analyzer |
Where allowed:
Examples:
|
%SandboxQueueThreshold% |
The maximum number of messages in the sandbox queue before Deep Discovery Email Inspector sends an alert notification |
Where allowed:
Examples:
|
%ServiceList% |
The list of services affected by the connection issue |
Where allowed:
Example:
|
%ServiceName% |
The stopped Deep Discovery Email Inspector service Where allowed:
|
Where allowed:
Example:
|
%TotalMessages% |
The total number of messages with unsuccessful DKIM signing |
Where allowed:
Example:
|