Views:

Provides a summary of suspicious threat detections from a specific sender. Example: name of the sender, summary information about the recipient and rules/violations, the total number of suspicious threats on the network

Table 1. Suspicious Sender Summary Data View

Data

Description

Sender

Displays the email address for the source of policy/rule violations.

Unique Policies/Rules

Displays the number of unique policies/rules the source computer violates.

Example: A managed product detects 10 policy violation instances of the same policy on 2 computers.

Unique Policies/Rules = 1

Unique Recipients

Displays the number of unique email message recipients receiving content that violate managed product suspicious threat policies.

Example: A managed product detects 10 suspicious threat violation instances of the same policy on 2 computers.

Unique Recipients = 2

Detections

Displays the total number of policy/rule violations managed products detect.

Example: A managed product detects 10 violation instances of the same type on one computer.

Detections = 10