mimecast/email-security Dashboards
The Attachment Protect dashboard provides comprehensive email attachment threat analysis through detailed threat detection visualizations. This dashboard enables monitoring of malicious attachments, analysis of file-based threats by extension, and tracking of threat patterns across email communications.
The Audit Log dashboard presents detailed system activity monitoring through chronological event tracking visualizations. This dashboard enables review of user activities, tracking of system changes, and investigation of security events across the email security environment.
The Awareness Training dashboard provides comprehensive security training analytics through detailed performance measurement visualizations. This dashboard enables tracking of phishing simulation results, monitoring of user engagement metrics, and assessment of training effectiveness across the organization.
The Data Leak Prevention dashboard presents comprehensive DLP policy enforcement through detailed event monitoring visualizations. This dashboard enables tracking of policy violations, analysis of sender behaviors, and monitoring of protective actions across email communications.
The Email Activity Summary dashboard provides comprehensive email traffic analysis through multi-dimensional monitoring visualizations. This dashboard enables tracking of message flow patterns, investigation of delivery issues, and monitoring of email processing activities across the environment.
The Impersonation Protect dashboard presents advanced impersonation threat detection through detailed security monitoring visualizations. This dashboard enables identification of malicious domains, analysis of targeted attacks, and tracking of suspicious sender patterns across email communications.
The Threat Intel Feed - Regional dashboard provides geographic-based threat intelligence through targeted monitoring visualizations. This dashboard enables tracking of regional threat patterns, analysis of malware distributions, and monitoring of location-specific security incidents across the environment.
The Threat Intel Feed - Targeted dashboard presents focused threat intelligence analysis through specialized tracking visualizations. This dashboard enables monitoring of targeted attack patterns, analysis of specific threat campaigns, and investigation of strategic threat activities across the infrastructure.
The URL Protect dashboard provides comprehensive URL-based threat analysis through detailed security monitoring visualizations. This dashboard enables tracking of malicious URLs, analysis of URL categories, and monitoring of web-based threats across email communications.
Attachment protect
The Attachment Protect dashboard provides comprehensive email attachment threat analysis through detailed threat detection visualizations. This dashboard enables monitoring of malicious attachments, analysis of file-based threats by extension, and tracking of threat patterns across email communications.
| Widget | Description | Type |
|---|---|---|
Displays a table of detected threats and accompanying details
using TTP attachment logs.
| Table | |
Displays a table of threats detected by recipient using TTP
attachment logs.
| Table | |
Displays a table of threats detected by file extension using TTP
attachment logs.
| Table | |
Displays a list of TTP-protected email attachments that are
considered threats over a one week timespan.
| Time Chart | |
Displays a table of threats detected and associated domain data
using TTP attachment logs.
| Table |
Audit log
The Audit Log dashboard presents detailed system activity monitoring through chronological event tracking visualizations. This dashboard enables review of user activities, tracking of system changes, and investigation of security events across the email security environment.
| Widget | Description | Type |
|---|---|---|
Displays a table of the most recent audit log entries in
descending order arranged by user and event time.
| Table |
Awareness training
The Awareness Training dashboard provides comprehensive security training analytics through detailed performance measurement visualizations. This dashboard enables tracking of phishing simulation results, monitoring of user engagement metrics, and assessment of training effectiveness across the organization.
| Widget | Description | Type |
|---|---|---|
Displays a table of count of users based on the correctly answered
phishing training.
| Table | |
Displays a table showing details of users who clicked on phishing
links.
| Table | |
Displays a table of a count of users based on the number of videos
in the watchlist.
| Table | |
Displays a table of a count of users based on the phishing links
clicked by the user.
| Table | |
Displays a table of a count of users based on the correctly
answered questions.
| Table | |
Displays a table of a count of users based on the number of
campaigns sent to users.
| Table | |
Displays a table of a count of users based on the incorrectlu
answered questions.
| Table | |
Displays a table of count of users based on the incorrectly
answered phishing training.
| Table | |
Displays a table of a count of users based on template name.
| Table | |
Displays a table of a count of users based on the number of
training modules assigned to users.
| Table | |
Displays a table of a count of users based on number of unwateched
videos.
| Table | |
Displays a table of a count of users based on IP address from
where the click was made.
| Table | |
| parameterPanel |
Data leak prevention
The Data Leak Prevention dashboard presents comprehensive DLP policy enforcement through detailed event monitoring visualizations. This dashboard enables tracking of policy violations, analysis of sender behaviors, and monitoring of protective actions across email communications.
| Widget | Description | Type |
|---|---|---|
Displays a table of a system's policies using DLP logs.
| Table | |
Displays a list of senders by email address using DLP logs.
| Table | |
Displays a table of actions using DLP logs.
| Table | |
Displays a list of events using DLP logs over the span of one
week.
| Time Chart |
Email activity summary
The Email Activity Summary dashboard provides comprehensive email traffic analysis through multi-dimensional monitoring visualizations. This dashboard enables tracking of message flow patterns, investigation of delivery issues, and monitoring of email processing activities across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a chart of email traffic over a 1 week timespan using
SIEM logs.
| Time Chart | |
Displays a table of held email traffic using SIEM process logs.
| Table | |
Displays a table of rejections by type using SIEM receipt logs.
| Table | |
Displays a list of delivery failures using SIEM receipt logs.
| Table | |
Displays a chart of SIEM Logs over a 1 week timespan.
| Time Chart |
Impersonation protect
The Impersonation Protect dashboard presents advanced impersonation threat detection through detailed security monitoring visualizations. This dashboard enables identification of malicious domains, analysis of targeted attacks, and tracking of suspicious sender patterns across email communications.
| Widget | Description | Type |
|---|---|---|
Displays a table of top potential malicious server attacks grouped
by sender address using TTP impersonation logs.
| Table | |
Displays a list of newly observed domains using TTP impersonation
logs.
| Single Value | |
Displays detected threat dictionaries that have been targeted
using TTP impersonation logs.
| Single Value | |
Displays a table of the top potential target recipients using TTP
impersonation logs.
| Table | |
Displays a list of detected internal domains that are similar
using TTP impersonation logs.
| Single Value | |
Displays reply address mismatches using TTP impersonation logs.
| Single Value | |
Displays a list of internal usernames detected using TTP
impersonation logs.
| Single Value |
Threat intel feed - regional
The Threat Intel Feed - Regional dashboard provides geographic-based threat intelligence through targeted monitoring visualizations. This dashboard enables tracking of regional threat patterns, analysis of malware distributions, and monitoring of location-specific security incidents across the environment.
| Widget | Description | Type |
|---|---|---|
Displays a list of regional threats over a one week timespan.
| Time Chart | |
Displays a list of regional malware threats from an Intel feed
malware grid by file name.
| Table |
Threat intel feed - targeted
The Threat Intel Feed - Targeted dashboard presents focused threat intelligence analysis through specialized tracking visualizations. This dashboard enables monitoring of targeted attack patterns, analysis of specific threat campaigns, and investigation of strategic threat activities across the infrastructure.
| Widget | Description | Type |
|---|---|---|
Displays a chart of targeted threats over a 1 week timespan.
| Time Chart | |
Displays a table of targeted threats by file name.
| Table |
URL protect
The URL Protect dashboard provides comprehensive URL-based threat analysis through detailed security monitoring visualizations. This dashboard enables tracking of malicious URLs, analysis of URL categories, and monitoring of web-based threats across email communications.
| Widget | Description | Type |
|---|---|---|
Displays a chart of malicious vs clean TTP URL logs over a one
week timespan.
| Time Chart | |
Displays a table of top malicious URLs using TTP URL logs.
| Table | |
Displays a table of top malicious URL categories using TTP logs.
| Table | |
Displays a table of a user's most recent URL logs and associated
data in descending order using TTP URL logs.
| Table |