Deep Discovery Email Inspector 3.6
> Alerts and Reports
Online Help Center Home
Privacy and Personal Data Collection Disclosure
Home
Documentation
Audience
Document Conventions
About Trend Micro
Introduction
About Deep Discovery Email Inspector
What's New
Features and Benefits
Advanced Detection
Features and Benefits
Flexible Deployment
Policy Management
Custom Threat Simulation Sandbox
Email Attachment Analysis
Embedded URL Analysis
Email Encryption
Spam Scanning
Graymail Scanning
Sender Filtering
Sender Authentication
Content Filtering
Data Loss Prevention
End-User Quarantine
Social Engineering Attack Protection
Password Derivation
A New Threat Landscape
Spear-Phishing Attacks
C&C Callback
A New Solution
Virtual Analyzer
Advanced Threat Scan Engine
Predictive Machine Learning
Web Reputation Services
Social Engineering Attack Protection
Apex Central
Deep Discovery Director
Getting Started
Getting Started Tasks
Management Console Navigation
Dashboard
Dashboard Overview
Tabs
Predefined Tabs
Tab Tasks
New Tab Window
Widgets
Adding Widgets to the Dashboard
Widget Tasks
Overview
Detection Summary Widget
Sender Filtering/Authentication Widget
Quarantined Messages Widget
Top Policy Violations Widget
Message Queues Widget
Processed Messages Widget
Threat Monitoring
Attack Sources Widget
High-Risk Messages Widget
Detected Messages Widget
Advanced Threat Indicators
Time-of-Click Protection Widget
Top Trends
Top Attachment Names Widget
Top Attachment Types Widget
Top Affected Recipients Widget
Top Attack Sources Widget
Top Callback Hosts from Virtual Analyzer Widget
Top Callback URLs from Virtual Analyzer Widget
Top Email Subjects Widget
System Status
Processing Volume Widget
Hardware Status Widget
Virtual Analyzer
Messages Submitted to Virtual Analyzer Widget
Average Virtual Analyzer Processing Time Widget
Suspicious Objects from Virtual Analyzer Widget
Detections
Detected Risk
Email Message Risk Levels
Virtual Analyzer Risk Levels
Threat Type Classifications
Exporting Search Results
Detected Messages
Viewing Detected Messages
Detected Message Search Filters
Applying Advanced Filters
Investigating a Detected Message
Email Message Details
Viewing Affected Recipients
Viewing Attack Sources
Viewing Senders
Viewing Email Subjects
Suspicious Objects
Viewing Suspicious Hosts
Viewing Suspicious URLs
Viewing Suspicious Files
Viewing Synchronized Suspicious Objects
Quarantine
Viewing Quarantined Messages
Quarantine Search Filters
Applying Advanced Filters
Quarantine Reasons
Investigating a Quarantined Email Message
Quarantined Message Details
Sender Filtering/Authentication
Viewing Sender Filtering/Authentication Detections
Policies
About Policies
General Message Scanning Order
Policy Management Guidelines
Policy Actions
Policy Matching
Policy Splintering
Policy List
Configuring a Policy
Address Groups
Adding an Address Group
Editing an Address Group
Policy Rules
Content Filtering Rules
Configuring a Content Filtering Rule
Scanning Conditions for Attachments
Adding Keyword Lists or Expressions
Data Loss Prevention (DLP) Rules
Configuring a DLP Rule
Antispam Rules
Configuring an Antispam Rule
Threat Protection Rules
Configuring a Threat Protection Rule
Policy Objects
Notifications
Configuring Recipient Notification
Message Tags
Specifying Message Tags
Redirect Pages
Customizing the Redirect Pages
Archive Servers
Configuring an Archive Server
Data Identifiers
Expressions
Predefined Expressions
Viewing Settings for Predefined Expressions
Customized Expressions
Criteria for Customized Expressions
Configuring a Customized Expression
Importing Expressions
Exporting Expressions
File Attributes
Predefined File Attributes List
Configuring File Attributes
Importing File Attributes
Exporting File Attributes
Keyword Lists
Predefined Keyword Lists
Customized Keyword Lists
Criteria for Customized Keyword Lists
Configuring a Keyword List
Importing Keyword Lists
Exporting Keyword Lists
Data Loss Prevention (DLP) Templates
Predefined DLP Templates
Customized DLP Templates
Condition Statements and Logical Operators
Creating a DLP Template
Importing DLP Templates
Exporting DLP Templates
Policy Exceptions
Configuring Message Exceptions
Managing Object Exceptions
Adding an Object Exception
Importing Object Exceptions
Configuring URL Keyword Exceptions
Graymail Exceptions
Adding a Graymail Exception
Importing Graymail Exceptions
Configuring Email Encryption Exceptions
Alerts and Reports
Alerts
Critical Alerts
Important Alerts
Informational Alerts
Configuring Alert Notifications
Viewing Triggered Alerts
Managing Alerts
Alert Notification Parameters
Critical Alert Parameters
Important Alert Parameters
Informational Alert Parameters
Reports
Scheduling Reports
Generating On-Demand Reports
Logs
Time-Based Filters and DST
Email Message Tracking
Querying Message Tracking Logs
MTA Events
Querying MTA Event Logs
System Events
Querying System Event Logs
Message Queue Logs
Querying Message Queue Logs
Rerouting Messages in Message Queues
Email Submission Logs
Querying Email Submission Logs
Time-of-Click Protection Logs
Querying Time-of-Click Protection Logs
Applying Advanced Filters
Administration
Component Updates
Components
Update Source
Configuring the Update Source
Updating Components
Rolling Back Components
Scheduling Component Updates
Product Updates
System Updates
Managing Patches
Upgrading Firmware
Scanning / Analysis
Email Scanning
Virtual Analyzer
Virtual Analyzer Overview
Virtual Analyzer Statuses
Overall Status Table
Virtual Analyzer Images
Virtual Analyzer Image Preparation
Importing Virtual Analyzer Images
Importing an Image from a Local or Network Folder
Importing an Image from an HTTP or FTP Server
Deleting Virtual Analyzer Images
Modifying Instances
Configuring Virtual Analyzer Network and Filters
Certified Safe Software Service
Virtual Analyzer Network Types
Virtual Analyzer File Submission Filters
Configuring an External Virtual Analyzer
Email Submissions
Manually Submitting Email Message Samples
URL Scanning
Disabling URL Scanning
File Passwords
Password-protected File Types
Adding File Passwords
Importing File Passwords
Smart Protection
About Smart Protection Server
Setting Up Smart Protection Server
Configuring Smart Protection Settings
Smart Feedback
Enabling Smart Feedback
YARA Rules
Creating a YARA Rule File
Adding a YARA Rule File
Editing a YARA Rule File
Deleting a YARA Rule File
Exporting a YARA Rule File
Time-of-Click URL Protection
Configuring Time-of-Click Protection Settings
Business Email Compromise
Adding a High-Profile User
Adding an Internal Domain
Adding an Approved Sender
Sender Filtering/Authentication Settings
Sender Filter Order of Evaluation
SMTP Error Codes
Approved Senders List
Adding Approved Senders
Blocked Senders List
Adding Blocked Senders
Enabling Email Reputation Services
Configuring DHA Protection Settings
Configuring Bounce Attack Protection Settings
Configuring SMTP Traffic Throttling Settings
Sender Policy Framework (SPF)
Configuring SPF Settings
DomainKeys Identified Mail (DKIM)
Configuring DKIM Authentication Settings
DKIM Signatures
Configuring a DKIM Signature
Importing DKIM Signatures
Domain-based Message Authentication, Reporting & Conformance (DMARC)
Configuring DMARC Settings
End-User Quarantine
Configuring User Quarantine Access Settings
Adding an SMTP Server for EUQ Authentication
EUQ Digest
Inline Action Links
Configuring EUQ Digest Settings
End-User Quarantine Console
Accessing the End-User Quarantine Console
Viewing Quarantined Messages
Adding Approved Senders
Viewing Quarantined Messages for Distribution Lists
Mail Settings
Message Delivery
Configuring SMTP Connection Settings
Configuring TLS Settings
Configuring Message Delivery Settings
Importing Message Delivery Settings
Configuring Limits and Exceptions
Configuring the SMTP Greeting Message
Edge MTA Relay Servers
Configuring Edge MTA Relay Servers
Internal Domains
Adding Internal Domains
Importing Internal Domains
Integrated Products/Services
Integrated Trend Micro Products
Apex Central
Apex Central Features
Apex Central Components
Registering to Apex Central
Unregistering from Apex Central
Deep Discovery Director
Deep Discovery Director Registration Considerations
Registering to Deep Discovery Director
Unregistering from Deep Discovery Director
Threat Intelligence Sharing
Configuring Threat Intelligence Sharing Settings
Auxiliary Products/Services
Trend Micro TippingPoint Security Management System (SMS)
Configuring Trend Micro TippingPoint Security Management System (SMS)
Check Point Open Platform for Security (OPSEC)
Configuring Check Point Open Platform for Security (OPSEC)
Preconfiguring a Security Gateway
Configuring a Secured Connection
IBM Security Network Protection
Configuring IBM Security Network Protection
Palo Alto Panorama or Firewalls
Configuring Palo Alto Panorama and Firewalls
Microsoft Active Directory
Configuring Microsoft Active Directory Settings
Log Settings
Adding a Syslog Server
Editing Syslog Server Profiles
SFTP
Email Encryption
Registering Domains for Email Encryption
Configure Default Email Identity for Message Signing
System Settings
Network Settings
Configuring Network Settings
Operation Modes
Monitoring Rules for SPAN/TAP Mode
Adding a Monitoring Rule
Editing a Monitoring Rule
Deleting a Monitoring Rule
Configuring Proxy Settings
Configuring the Notification SMTP Server
Configuring System Time
SNMP
Configuring Trap Messages
Configuring Manager Requests
Configuring Session Timeout Setting
Accounts / Contacts
Managing Accounts
Account Role Classifications
Adding a Local User Account
Adding an Active Directory User Account or Group
Editing Accounts
Deleting Accounts
Unlocking a Locked Account
Changing Your Password
Managing Contacts
System Maintenance
Backing Up or Restoring a Configuration
License Compatibility
Backup Recommendations
Backing Up a Configuration
Restoring a Configuration
Configuring Storage Maintenance
Powering Off or Restarting Deep Discovery Email Inspector
Debug Logs
Exporting Debugging Files
Configuring Log Level
Testing Network Connections
Licenses
Maintenance Agreement
Activation Codes
Product License Status
Viewing Your Product License
Activating or Renewing Your Product License
About Deep Discovery Email Inspector
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback
Appendices
Transport Layer Security
About Transport Layer Security
Deploying Deep Discovery Email Inspector in TLS Environments
Prerequisites for Using TLS
Obtaining a Digital Certificate
Ensure that the Certificate Format is Valid
Configuring TLS Settings for Incoming Messages
Configuring TLS Settings for Outgoing Messages
Creating and Deploying Certificates
Creating the Certificate Authority Key and Certificate
Creating the Deep Discovery Email Inspector Private Key and Certificate
Creating the Keys and Certificates for Other Servers
Signing the Deep Discovery Email Inspector Certificate
Uploading Certificates
Using the Command Line Interface
Using the CLI
Entering the CLI
Command Line Interface Commands
Entering Privileged Mode
CLI Command Reference
configure product management-port
configure product operation-mode
configure network basic
configure network dns
configure network hostname
configure network interface
configure network route add
configure network route default
configure network route del
configure network route del default/default ipv6
configure service nscd disable
configure service nscd enable
configure service ssh disable
configure service ssh enable
configure service ssh port
configure service ntp
configure system date
configure system password enable
configure system timezone
enable
exit
help
history
logout
ping
ping6
start task postfix drop
start task postfix flush
start task postfix queue
start service nscd
start service postfix
start service product
start service ssh
stop process core
stop service nscd
stop service postfix
stop service product
stop service ssh
reboot
resolve
show storage statistic
show network
show kernel
show service
show memory
show process
show product-info
show system
shutdown
traceroute
Notification Message Tokens
Recipient Notification Message Tokens
Alert Notification Message Tokens
Connections and Ports
Service Addresses and Ports
Ports Used by the Appliance
SNMP Object Identifiers
SNMP Query Objects
SNMP Traps
Registration Objects
IPv6 Support in Deep Discovery Email Inspector
Configuring IPv6 Addresses
Configurable IPv6 Addresses
Management Console IPv6 Addresses
System Event Logs
Sender Authentication Error Codes
Glossary
Alerts and Reports
Topics include:
Alerts
Reports
Alerts
Reports