Views:

Provides a summary of the recipients with the most suspicious threat detections. Example: name of the recipient, summary information about the senders and rules/violations, the total number of suspicious threats on the network

Table 1. Suspicious Riskiest Recipient Summary Data View

Data

Description

Recipient

Displays the email address of the recipient affected by the suspicious threat.

Unique Policies/Rules

Displays the number of unique policies/rules the source computer violates.

Example: A managed product detects 10 policy violation instances of the same policy on 2 computers.

Unique Policies/Rules = 1

Unique Senders

Displays the number of unique email message senders sending content that violates managed product suspicious threat policies.

Example: A managed product detects 10 suspicious threat violation instances of the same policy coming from 3 computers.

Unique Senders = 3

Detections

Displays the total number of policy/rule violations managed products detect.

Example: A managed product detects 10 violation instances of the same type on one computer.

Detections = 10