Views:
Provides a summary of suspicious threat detections from a specific source. Example: name of the source, summary information about the destination and rules/violations, the total number of suspicious threats on the network

Suspicious Source Summary Data View

Data
Description
Source IP
Displays the IP addresses of sources where suspicious threats originate.
Unique Policies/Rules
Displays the number of unique policies/rules the source computer violates.
Example: A managed product detects 10 policy violation instances of the same policy on 2 computers.
Unique Policies/Rules = 1
Unique Endpoints
Displays the number of unique computers affected by the suspicious threat.
Example: A managed product detects 10 suspicious threat instances of the same type on 2 computers.
Unique Endpoints = 2
Detections
Displays the total number of policy/rule violations managed products detect.
Example: A managed product detects 10 violation instances of the same type on one computer.
Detections = 10