Views:
Provides a summary of suspicious threat detections over a period of time (daily, weekly, monthly). Example: time and date when summary data was collected, summary information about the source and destination, the total number of suspicious threats on the network

Suspicious Threat Detection Over Time Summary Data View

Data
Description
Date/Time
Displays the time that the summary of the data occurs.
Unique Policies/Rules
Displays the number of unique policies/rules the source computer violates.
Example: A managed product detects 10 policy violation instances of the same policy on 2 computers.
Unique Policies/Rules = 1
Unique Endpoints
Displays the number of unique computers affected by the suspicious threat.
Example: A managed product detects 10 suspicious threat instances of the same type on 2 computers.
Unique Endpoints = 2
Unique Sources
Displays the number of unique sources where suspicious threats originate.
Example: A managed product detects 10 suspicious threat instances of the same type originating from 3 computers.
Unique Sources = 3
Unique Recipients
Displays the number of unique email message recipients receiving content that violates managed product suspicious threat policies.
Example: A managed product detects 10 suspicious threat violation instances of the same policy on 2 computers.
Unique Recipients = 2
Unique Senders
Displays the number of unique email message senders sending content that violates managed product suspicious threat policies.
Example: A managed product detects 10 suspicious threat violation instances of the same policy coming from 3 computers.
Unique Senders = 3
Detections
Displays the total number of policy/rule violations managed products detect.
Example: A managed product detects 10 violation instances of the same type on one computer.
Detections = 10