Attachment protect
WidgetDescriptionType
Threats detected Displays a table of detected threats and accompanying details using TTP attachment logs.

Hide Query

Show Query

Table
Threats detected by recipient Displays a table of threats detected by recipient using TTP attachment logs.

Hide Query

Show Query

Table
Threats detected by file extension Displays a table of threats detected by file extension using TTP attachment logs.

Hide Query

Show Query

Table
Threats detected over time Displays a list of TTP-protected email attachments that are considered threats over a one week timespan.

Hide Query

Show Query

Time Chart
Threats detected by sending domain Displays a table of threats detected and associated domain data using TTP attachment logs.

Hide Query

Show Query

Table
Audit log
WidgetDescriptionType
Most recent audit log entries Displays a table of the most recent audit log entries in descending order arranged by user and event time.

Hide Query

Show Query

Table
Awareness training
WidgetDescriptionType
Breakdown by number of correct answers Displays a table of count of users based on the correctly answered phishing training.

Hide Query

Show Query

Table
Users clicked on phishing data Displays a table showing details of users who clicked on phishing links.

Hide Query

Show Query

Table
Breakdown by watchlist count Displays a table of a count of users based on the number of videos in the watchlist.

Hide Query

Show Query

Table
Breakdown by number of campaigns clicked Displays a table of a count of users based on the phishing links clicked by the user.

Hide Query

Show Query

Table
Breakdown by correct number Displays a table of a count of users based on the correctly answered questions.

Hide Query

Show Query

Table
Breakdown by number of campaigns sent Displays a table of a count of users based on the number of campaigns sent to users.

Hide Query

Show Query

Table
Breakdown by incorrect number Displays a table of a count of users based on the incorrectlu answered questions.

Hide Query

Show Query

Table
Breakdown by number of incorrect answers Displays a table of count of users based on the incorrectly answered phishing training.

Hide Query

Show Query

Table
Breakdown by template name Displays a table of a count of users based on template name.

Hide Query

Show Query

Table
Breakdown by number of training modules assigned Displays a table of a count of users based on the number of training modules assigned to users.

Hide Query

Show Query

Table
Breakdown by number not watched Displays a table of a count of users based on number of unwateched videos.

Hide Query

Show Query

Table
Breakdown by clicked IP Displays a table of a count of users based on IP address from where the click was made.

Hide Query

Show Query

Table
parameter-panel-1745316094934-0 parameterPanel
Data leak prevention
WidgetDescriptionType
Policies Displays a table of a system's policies using DLP logs.

Hide Query

Show Query

Table
Senders Displays a list of senders by email address using DLP logs.

Hide Query

Show Query

Table
Actions Displays a table of actions using DLP logs.

Hide Query

Show Query

Table
Events Displays a list of events using DLP logs over the span of one week.

Hide Query

Show Query

Time Chart
Email activity summary
WidgetDescriptionType
Email traffic Displays a chart of email traffic over a 1 week timespan using SIEM logs.

Hide Query

Show Query

Time Chart
Held Displays a table of held email traffic using SIEM process logs.

Hide Query

Show Query

Table
Rejections Displays a table of rejections by type using SIEM receipt logs.

Hide Query

Show Query

Table
Delivery failures Displays a list of delivery failures using SIEM receipt logs.

Hide Query

Show Query

Table
SIEM logs Displays a chart of SIEM Logs over a 1 week timespan.

Hide Query

Show Query

Time Chart
Impersonation protect
WidgetDescriptionType
Top potential malicious server Displays a table of top potential malicious server attacks grouped by sender address using TTP impersonation logs.

Hide Query

Show Query

Table
Newly observed domain Displays a list of newly observed domains using TTP impersonation logs.

Hide Query

Show Query

Single Value
Targeted threat dictionary detected Displays detected threat dictionaries that have been targeted using TTP impersonation logs.

Hide Query

Show Query

Single Value
Top potential target recipients Displays a table of the top potential target recipients using TTP impersonation logs.

Hide Query

Show Query

Table
Similar internal domain detected Displays a list of detected internal domains that are similar using TTP impersonation logs.

Hide Query

Show Query

Single Value
Reply mismatch detected Displays reply address mismatches using TTP impersonation logs.

Hide Query

Show Query

Single Value
Internal user name detected Displays a list of internal usernames detected using TTP impersonation logs.

Hide Query

Show Query

Single Value
Threat intel feed - regional
WidgetDescriptionType
Regional threats detected over time Displays a list of regional threats over a one week timespan.

Hide Query

Show Query

Time Chart
Regional threats by file name Displays a list of regional malware threats from an Intel feed malware grid by file name.

Hide Query

Show Query

Table
Threat intel feed - targeted
WidgetDescriptionType
Targeted threats over time Displays a chart of targeted threats over a 1 week timespan.

Hide Query

Show Query

Time Chart
Targeted threats by file name Displays a table of targeted threats by file name.

Hide Query

Show Query

Table
URL protect
WidgetDescriptionType
Malicious vs clean logs over time Displays a chart of malicious vs clean TTP URL logs over a one week timespan.

Hide Query

Show Query

Time Chart
Top malicious URLs Displays a table of top malicious URLs using TTP URL logs.

Hide Query

Show Query

Table
Top URL categories Displays a table of top malicious URL categories using TTP logs.

Hide Query

Show Query

Table
Most recent URL logs Displays a table of a user's most recent URL logs and associated data in descending order using TTP URL logs.

Hide Query

Show Query

Table