• Attachment protect

    The Attachment Protect dashboard provides comprehensive email attachment threat analysis through detailed threat detection visualizations. This dashboard enables monitoring of malicious attachments, analysis of file-based threats by extension, and tracking of threat patterns across email communications.

  • Audit log

    The Audit Log dashboard presents detailed system activity monitoring through chronological event tracking visualizations. This dashboard enables review of user activities, tracking of system changes, and investigation of security events across the email security environment.

  • Awareness training

    The Awareness Training dashboard provides comprehensive security training analytics through detailed performance measurement visualizations. This dashboard enables tracking of phishing simulation results, monitoring of user engagement metrics, and assessment of training effectiveness across the organization.

  • Data leak prevention

    The Data Leak Prevention dashboard presents comprehensive DLP policy enforcement through detailed event monitoring visualizations. This dashboard enables tracking of policy violations, analysis of sender behaviors, and monitoring of protective actions across email communications.

  • Email activity summary

    The Email Activity Summary dashboard provides comprehensive email traffic analysis through multi-dimensional monitoring visualizations. This dashboard enables tracking of message flow patterns, investigation of delivery issues, and monitoring of email processing activities across the environment.

  • Impersonation protect

    The Impersonation Protect dashboard presents advanced impersonation threat detection through detailed security monitoring visualizations. This dashboard enables identification of malicious domains, analysis of targeted attacks, and tracking of suspicious sender patterns across email communications.

  • Threat intel feed - regional

    The Threat Intel Feed - Regional dashboard provides geographic-based threat intelligence through targeted monitoring visualizations. This dashboard enables tracking of regional threat patterns, analysis of malware distributions, and monitoring of location-specific security incidents across the environment.

  • Threat intel feed - targeted

    The Threat Intel Feed - Targeted dashboard presents focused threat intelligence analysis through specialized tracking visualizations. This dashboard enables monitoring of targeted attack patterns, analysis of specific threat campaigns, and investigation of strategic threat activities across the infrastructure.

  • URL protect

    The URL Protect dashboard provides comprehensive URL-based threat analysis through detailed security monitoring visualizations. This dashboard enables tracking of malicious URLs, analysis of URL categories, and monitoring of web-based threats across email communications.

Attachment protect

The Attachment Protect dashboard provides comprehensive email attachment threat analysis through detailed threat detection visualizations. This dashboard enables monitoring of malicious attachments, analysis of file-based threats by extension, and tracking of threat patterns across email communications.

WidgetDescriptionType
Threats detected Displays a table of detected threats and accompanying details using TTP attachment logs.

Hide Query

Show Query

Table
Threats detected by recipient Displays a table of threats detected by recipient using TTP attachment logs.

Hide Query

Show Query

Table
Threats detected by file extension Displays a table of threats detected by file extension using TTP attachment logs.

Hide Query

Show Query

Table
Threats detected over time Displays a list of TTP-protected email attachments that are considered threats over a one week timespan.

Hide Query

Show Query

Time Chart
Threats detected by sending domain Displays a table of threats detected and associated domain data using TTP attachment logs.

Hide Query

Show Query

Table
Audit log

The Audit Log dashboard presents detailed system activity monitoring through chronological event tracking visualizations. This dashboard enables review of user activities, tracking of system changes, and investigation of security events across the email security environment.

WidgetDescriptionType
Most recent audit log entries Displays a table of the most recent audit log entries in descending order arranged by user and event time.

Hide Query

Show Query

Table
Awareness training

The Awareness Training dashboard provides comprehensive security training analytics through detailed performance measurement visualizations. This dashboard enables tracking of phishing simulation results, monitoring of user engagement metrics, and assessment of training effectiveness across the organization.

WidgetDescriptionType
Breakdown by number of correct answers Displays a table of count of users based on the correctly answered phishing training.

Hide Query

Show Query

Table
Users clicked on phishing data Displays a table showing details of users who clicked on phishing links.

Hide Query

Show Query

Table
Breakdown by watchlist count Displays a table of a count of users based on the number of videos in the watchlist.

Hide Query

Show Query

Table
Breakdown by number of campaigns clicked Displays a table of a count of users based on the phishing links clicked by the user.

Hide Query

Show Query

Table
Breakdown by correct number Displays a table of a count of users based on the correctly answered questions.

Hide Query

Show Query

Table
Breakdown by number of campaigns sent Displays a table of a count of users based on the number of campaigns sent to users.

Hide Query

Show Query

Table
Breakdown by incorrect number Displays a table of a count of users based on the incorrectlu answered questions.

Hide Query

Show Query

Table
Breakdown by number of incorrect answers Displays a table of count of users based on the incorrectly answered phishing training.

Hide Query

Show Query

Table
Breakdown by template name Displays a table of a count of users based on template name.

Hide Query

Show Query

Table
Breakdown by number of training modules assigned Displays a table of a count of users based on the number of training modules assigned to users.

Hide Query

Show Query

Table
Breakdown by number not watched Displays a table of a count of users based on number of unwateched videos.

Hide Query

Show Query

Table
Breakdown by clicked IP Displays a table of a count of users based on IP address from where the click was made.

Hide Query

Show Query

Table
parameter-panel-1745316094934-0 parameterPanel
Data leak prevention

The Data Leak Prevention dashboard presents comprehensive DLP policy enforcement through detailed event monitoring visualizations. This dashboard enables tracking of policy violations, analysis of sender behaviors, and monitoring of protective actions across email communications.

WidgetDescriptionType
Policies Displays a table of a system's policies using DLP logs.

Hide Query

Show Query

Table
Senders Displays a list of senders by email address using DLP logs.

Hide Query

Show Query

Table
Actions Displays a table of actions using DLP logs.

Hide Query

Show Query

Table
Events Displays a list of events using DLP logs over the span of one week.

Hide Query

Show Query

Time Chart
Email activity summary

The Email Activity Summary dashboard provides comprehensive email traffic analysis through multi-dimensional monitoring visualizations. This dashboard enables tracking of message flow patterns, investigation of delivery issues, and monitoring of email processing activities across the environment.

WidgetDescriptionType
Email traffic Displays a chart of email traffic over a 1 week timespan using SIEM logs.

Hide Query

Show Query

Time Chart
Held Displays a table of held email traffic using SIEM process logs.

Hide Query

Show Query

Table
Rejections Displays a table of rejections by type using SIEM receipt logs.

Hide Query

Show Query

Table
Delivery failures Displays a list of delivery failures using SIEM receipt logs.

Hide Query

Show Query

Table
SIEM logs Displays a chart of SIEM Logs over a 1 week timespan.

Hide Query

Show Query

Time Chart
Impersonation protect

The Impersonation Protect dashboard presents advanced impersonation threat detection through detailed security monitoring visualizations. This dashboard enables identification of malicious domains, analysis of targeted attacks, and tracking of suspicious sender patterns across email communications.

WidgetDescriptionType
Top potential malicious server Displays a table of top potential malicious server attacks grouped by sender address using TTP impersonation logs.

Hide Query

Show Query

Table
Newly observed domain Displays a list of newly observed domains using TTP impersonation logs.

Hide Query

Show Query

Single Value
Targeted threat dictionary detected Displays detected threat dictionaries that have been targeted using TTP impersonation logs.

Hide Query

Show Query

Single Value
Top potential target recipients Displays a table of the top potential target recipients using TTP impersonation logs.

Hide Query

Show Query

Table
Similar internal domain detected Displays a list of detected internal domains that are similar using TTP impersonation logs.

Hide Query

Show Query

Single Value
Reply mismatch detected Displays reply address mismatches using TTP impersonation logs.

Hide Query

Show Query

Single Value
Internal user name detected Displays a list of internal usernames detected using TTP impersonation logs.

Hide Query

Show Query

Single Value
Threat intel feed - regional

The Threat Intel Feed - Regional dashboard provides geographic-based threat intelligence through targeted monitoring visualizations. This dashboard enables tracking of regional threat patterns, analysis of malware distributions, and monitoring of location-specific security incidents across the environment.

WidgetDescriptionType
Regional threats detected over time Displays a list of regional threats over a one week timespan.

Hide Query

Show Query

Time Chart
Regional threats by file name Displays a list of regional malware threats from an Intel feed malware grid by file name.

Hide Query

Show Query

Table
Threat intel feed - targeted

The Threat Intel Feed - Targeted dashboard presents focused threat intelligence analysis through specialized tracking visualizations. This dashboard enables monitoring of targeted attack patterns, analysis of specific threat campaigns, and investigation of strategic threat activities across the infrastructure.

WidgetDescriptionType
Targeted threats over time Displays a chart of targeted threats over a 1 week timespan.

Hide Query

Show Query

Time Chart
Targeted threats by file name Displays a table of targeted threats by file name.

Hide Query

Show Query

Table
URL protect

The URL Protect dashboard provides comprehensive URL-based threat analysis through detailed security monitoring visualizations. This dashboard enables tracking of malicious URLs, analysis of URL categories, and monitoring of web-based threats across email communications.

WidgetDescriptionType
Malicious vs clean logs over time Displays a chart of malicious vs clean TTP URL logs over a one week timespan.

Hide Query

Show Query

Time Chart
Top malicious URLs Displays a table of top malicious URLs using TTP URL logs.

Hide Query

Show Query

Table
Top URL categories Displays a table of top malicious URL categories using TTP logs.

Hide Query

Show Query

Table
Most recent URL logs Displays a table of a user's most recent URL logs and associated data in descending order using TTP URL logs.

Hide Query

Show Query

Table