Views:
Configure the following event notification to notify administrators when documents that contain potential exploit code have been detected on your network.

Procedure

  1. Go to DetectionsNotificationsEvent Notifications.
    The Event Notifications screen appears.
  2. Click Advanced Threat Activity.
    A list of events appears.
  3. In the Event column, click Potential document exploit detections.
    The Potential Document Exploit Detections screen appears.
  4. Specify the following notification settings.
    Settings
    Description
    Trigger an alert for each detection
    Select to send an event notification for each detection.
    Specify the alert threshold that applies to a single endpoint
    Select to send event notifications only for detections that match the specified criteria.
    • Detections: Specify the number of detections
    • Period: Specify the time period in hours
    Attach logs in CSV format
    Select to send event notification recipients a *.csv file containing log data about the detections.
  5. Select recipients for the notification.
    1. From the Available Users and Groups list, select contact groups or user accounts.
    2. Click >.
      The selected contact groups or user accounts appear in the Selected Users and Groups list.
  6. Enable one or more of the following notification methods.
    Method
    Description
    Email message
    To customize the email notification template, use supported token variables or modify the text in the Subject and Message fields.
  7. To test if recipients can receive the event notification, click Test.
  8. Click Save.