Views:

Affected recipients are recipients of malicious or suspicious email messages. Gain intelligence about who in your network is targeted by spear-phishing attacks or social engineering attacks and understand the attack behavior in related messages. Learn if your executive is targeted by the attacks and then raise his/her awareness about the attack pattern. Discovering a community of affected recipients belonging to the same department can indicate that the attacker has access to your company address book.

  1. Go to Detections > Recipients.
  2. Specify the search criteria.
    • Recipient (email address)
    • Period
  3. Press ENTER.

    All email messages matching the search criteria appear.

  4. View the results.

    Header

    Description

    Recipient

    View the detected message recipient email addresses.

    Detections

    View the email messages with malicious or suspicious characteristics. Signature-based detection involves searching for known patterns of data within executable code or behavior analysis. Click the number to see more information about the suspicious message.

    High Risk

    View the detected messages with malicious characteristics.

    Medium Risk

    View the detected messages with characteristics that are most likely malicious.

    Low Risk

    View the detected spam messages or detected messages with content violations or suspicious characteristics.

    Spam/Graymail

    View the number of detected spam messages or graymail.

    Content Violation

    View the number of detected messages with content violations.

    DLP Incident

    View the number of detected messages with DLP incidents.

    View the number of email messages with embedded malicious links.

    View the number of file attachments that are detected by policy rules.

    Latest Detection

    View the most recent occurrence of the detected message.