Configure the following event notification to notify administrators when documents
that contain potential exploit code have been detected on your network.
Procedure
- Go to .The Event Notifications screen appears.
- Click Advanced Threat
Activity.A list of events appears.
- In the Event column, click Potential document exploit
detections.The Potential Document Exploit Detections screen appears.
- Specify the following notification settings.SettingsDescriptionTrigger an alert for each detectionSelect to send an event notification for each detection.Specify the alert threshold that applies to a single endpointSelect to send event notifications only for detections that match the specified criteria.
-
Detections: Specify the number of detections
-
Period: Specify the time period in hours
Attach logs in CSV formatSelect to send event notification recipients a *.csv file containing log data about the detections. -
- Select recipients for the notification.
- From the Available Users and Groups list, select contact groups or user accounts.
- Click >.The selected contact groups or user accounts appear in the Selected Users and Groups list.
- Enable one or more of the following notification methods.MethodDescriptionEmail messageTo customize the email notification template, use supported token variables or modify the text in the Subject and Message fields.For more information, see Standard Token Variables and Advanced Threat Activity Token Variables.
- To test if recipients can receive the event notification, click Test.
- Click Save.