The following tokens are provided for you to customize notification
                  messages for administrators and users.
| 
 Token ID 
 | 
 Description 
 | 
| 
 %Product_Name% 
 | 
 Name of our product. 
 | 
| 
 %Security_risk_name% 
 | 
 Name of the security risk detected, for example, "HEUR_PDFEXP.A",
                              "EXPL_CVE20060022". 
For unscannable files, options for this token are as follows: 
  | 
| 
 %action% 
 | 
 Action taken after detection of a security risk. 
 | 
| 
 %date% %time% 
 | 
  | 
| 
 %foundin% 
 | 
 Location where a security risk was detected. 
For Exchange Online, it is <email
                                 address>\<mailbox folder path>; for SharePoint Online, OneDrive,
                                 Microsoft Teams (Teams), Box, Dropbox, and Google Drive, it is the folder path or
                                 website URL; for Gmail, it is the label(s) of the email message; for Teams Chat,
                                 it is the private teams chat URL. 
 | 
| 
 %policy_name% 
 | 
 Name of a configured policy that was violated. 
 | 
| 
 %sender% 
 | 
 Email address of the sender. 
 | 
| 
 %violator% 
 | 
 Affected user related to a policy violation. For Exchange
                                 Online and Gmail, it is the mailbox of a protected user that received or sent an
                                 email message violating a policy; for SharePoint Online, OneDrive, Microsoft Teams
                                 (Teams), Box, Dropbox, and Google Drive, it is the user who uploaded or modified a
                                 file violating a policy; for Teams Chat, it is the user that sent a private chat
                                 message violating a policy. 
 | 
| 
 %recipient% 
 | 
 Email address of the recipient. 
 | 
| 
 %subject% 
 | 
 Subject of an email message violating a policy. 
 | 
| 
 %attachments% 
 | 
 Name of an attachment violating a policy. 
 | 
| 
 %filename% 
 | 
 Name of a file violating a policy. 
 | 
| 
 %suspicious_url% 
 | 
 Suspicious URL detected. 
 | 
| 
 %risk_level% 
 | 
 There are five Web Reputation risk levels assigned to an analyzed URL: 
 There are five Virtual Analyzer risk levels assigned to an analyzed object: 
  | 
| 
 %url_category% 
 | 
 Category of a suspicious URL detected. 
There are more than 90 categories, such as "Spyware" and "Crack". 
 | 
| 
 %dlptemplatename% 
 | 
 Name of a sensitivity label or compliance template that triggers the Data Loss
                              Prevention policy. 
 | 
| 
 %spam_category% 
 | 
 Category of a spam email message detected. 
There are four spam categories supported: 
  | 
| 
 %detected_by% 
 | 
 Technology or method through which email messages and files were detected as
                              containing a security threat. Options include: 
  | 
| 
 %file_format% 
 | 
 Format of a file that violated the Keyword Extraction security filter in a Data
                              Loss Prevention policy. 
 | 
| 
 %violated_keyword% 
 | 
 Keyword(s) that caused a file to violate the Keyword Extraction security filter in
                              a Data Loss Prevention policy. 
 | 
| 
 %redirected_to% 
 | 
 Email addresses to which email messages triggering the "Change
                              recipient" action are redirected. 
 | 
The following tokens are provided for you to specify the content in
                  Replacement text.
| 
 Service 
 | 
 Token ID 
 | 
 Description 
 | 
| 
 Exchange Online 
Exchange Online (Inline Mode) 
Gmail (Inline Mode) - Inbound Protection 
 | 
 [Attachment Name] 
 | 
 Name of an attachment violating a policy. 
 | 
| 
 SharePoint Online 
OneDrive 
Microsoft Teams 
Box 
Dropbox 
Google Drive 
 | 
 %action% 
 | 
 Action taken after detection of a security risk. 
 | 
| 
 %policy_name% 
 | 
 Name of a configured policy that was violated. 
 | 
|
| 
 %FilterName% 
 | 
 Filter in an Advanced Threat Protection or Data Loss Prevention policy that detects
                              an violation by a file in the protected application or service. 
Applicable filters include: 
  | 
|
| 
 %Security_risk_name% 
 | 
 Name of the security risk detected, for example, "HEUR_PDFEXP.A",
                              "EXPL_CVE20060022". 
For unscannable files, options for this token are as follows: 
  | 
|
| 
 %filename% 
 | 
 Name of a file violating a policy. 
 | 
|
| 
 %suspicious_url% 
 | 
 Suspicious URL detected. 
 | 
|
| 
 %dlptemplatename% 
 | 
 Name of a sensitivity label or compliance template that triggers the Data Loss
                              Prevention policy. 
 | 
|
| 
 %risk_level% 
 | 
 There are five Web Reputation risk levels assigned to an analyzed URL: 
 There are five Virtual Analyzer risk levels assigned to an analyzed object: 
  | 
The following tokens are provided for you to customize notification
                  messages for administrators and users in Writing Style Analysis for
                     BEC.
| 
 Token ID 
 | 
 Description 
 | 
| 
 %expected_sender_displayname% 
 | 
 Display name of the high profile user who is expected to be the real sender of an
                              email message. 
 | 
| 
 %action% 
 | 
 Action taken after detection of a probable BEC attack, which includes: 
  | 
| 
 %spam_category% 
 | 
 Category of a spam email message detected, which is BEC. 
 | 
| 
 %date% 
%time% 
 | 
 Date and time when a probable BEC attack was detected. 
 | 
| 
 %foundin% 
 | 
 Location where a probable BEC attack was detected. For Exchange Online, it is
                              <email address>\<mailbox folder path>; for Gmail, it is the label(s) of
                              the email message. 
 | 
| 
 %policy_name% 
 | 
 Name of a configured policy that was violated. 
 | 
| 
 %detected_by% 
 | 
 Technology or method through which an email message was detected as containing a
                              probable BEC attack, which is Writing style analysis. 
 | 
| 
 %sender% 
 | 
 Email address of the sender. 
 | 
| 
 %recipient% 
 | 
 Email address of the recipient. 
 | 
| 
 %subject% 
 | 
 Subject of an email message violating a policy. 
 | 
| 
 %attachments% 
 | 
 Name of an attachment violating a policy. 
 | 
| 
 %expected_sender% 
 | 
 Display name of the high profile user who is expected to be the real sender of an
                              email message. 
 | 
| 
 %origin_mail_message_id% 
 | 
 ID of an email message. 
 | 
The following tokens are provided for you to customize the disclaimer in the redirected
                  emails that triggered the "Change recipient" action.
| 
 Token ID 
 | 
 Description 
 | 
| 
 %policy_name% 
 | 
 Name of a configured policy that was violated. 
 | 
The following tokens are provided for you to customize the
                  disclaimer for messages detected as from suspicious senders.
| 
 Token ID 
 | 
 Description 
 | 
| 
 %detected_risk% 
 | 
 Specific risk that caused the message sender to be identified as suspicious. 
 | 
The following tokens are provided for you to customize the confirmation email that
                  is sent to end users upon receipt of a reported email to acknowledge their feedback.
| 
 Token ID 
 | 
 Description 
 | 
| 
 %subject% 
 | 
 Subject of the reported email message. 
 | 
| 
 %sender% 
 | 
 Sender email address of the reported email message. 
 | 
| 
 %recipients% 
 | 
 Recipient email addresses of the reported email message. 
 | 
| 
 %reporter% 
 | 
 Email address of the reporter. 
 | 
		