Views:
Provides specific information about suspicious threats on your network. Example: the policy/rule in violation, summary information about the source and destination, the total number of suspicious threats on the network

Overall Suspicious Threat Summary Data View

Data
Description
Policy/Rule
Displays the name of the policy/rule in violation.
Protocol
Displays the protocol over which the violation takes place.
Example: HTTP, FTP, SMTP
Unique Endpoints
Displays the number of unique computers affected by the suspicious threat.
Example: A managed product detects 10 suspicious threat instances of the same type on 2 computers.
Unique Endpoints = 2
Unique Sources
Displays the number of unique sources where suspicious threats originate.
Example: A managed product detects 10 suspicious threat instances of the same type originating from 3 computers.
Unique Sources = 3
Unique Recipients
Displays the number of unique email message recipients receiving content that violates managed product suspicious threat policies.
Example: A managed product detects 10 suspicious threat violation instances of the same policy on 2 computers.
Unique Recipients = 2
Unique Senders
Displays the number of unique email message senders sending content that violates managed product suspicious threat policies.
Example: A managed product detects 10 suspicious threat violation instances of the same policy coming from 3 computers.
Unique Senders = 3
Detections
Displays the total number of policy/rule violations managed products detect.
Example: A managed product detects 10 violation instances of the same type on one computer.
Detections equals 10.
Mitigations
Displays the number of endpoints Network VirusWall Enforcer devices or Trend Micro™ Threat Mitigator™ take action against.
Cleaned Endpoints
Displays the total number of endpoints Trend Micro Threat Mitigator cleans.
Clean Endpoint Rate (%)
Displays the percentage of endpoints Trend Micro Threat Mitigator cleans compared to the total Detections.