Provides a summary of suspicious threat detections
from a specific sender. Example: name of the sender, summary information
about the recipient and rules/violations, the total number of suspicious
threats on the network
Suspicious Sender Summary Data View
Data
|
Description
|
Sender
|
Displays the email address for the source
of policy/rule violations.
|
Unique Policies/Rules
|
Displays the number of unique policies/rules
the source computer violates.
Example: A managed product detects
10 policy violation instances of the same policy on 2 computers.
Unique
Policies/Rules = 1
|
Unique Recipients
|
Displays the number of unique email message
recipients receiving content that violate managed product suspicious
threat policies.
Example: A managed product detects 10 suspicious
threat violation instances of the same policy on 2 computers.
Unique
Recipients = 2
|
Detections
|
Displays the total number of policy/rule violations
managed products detect.
Example: A managed product detects
10 violation instances of the same type on one computer.
Detections
= 10
|