CLOUD SOLUTIONS

Email Security console

Walkthrough

This section details the elements present in the home page and all possible user-interface interactions.

75101_1.png
  1. Home Page - find two charts containing inbound email activity and most commonly triggered rules.

  2. Products - contains all Email Security configurations and settings.

  3. Analytics - run multiple types of reports and generate charts based on said reports.

  4. Active Downloads -view the progress of report downloads. Once the report is ready, a red flag will indicate it can be downloaded.

Home page
Inbound Email Activity
75101_2.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the current report with the chosen filter.

    • Save as - use this when you have already saved the report and want to save the currently displayed one under a different name.

  3. Chart - the chart is a graphical day-by-day visual representation of inbound email activity. It displays the below values:

    • Delivered - number of emails safely delivered to company users

    • Spam Quarantine - number of emails flagged as spam and quarantined

    • Rejected - rejected messages

    • Dropped - dropped messages

    Note

    Clicking on any of these values in the chart will direct you to the Analytics page where it will display the report relevant to the value you selected.

  4. Legend - it describes what value each colored line represents.

    Note

    Clicking on a value will remove/add it to the chart.

Top Final Rules

This chart provides a visual representation of the most commonly applied final rules to messages over a specific period of time.

75101_3.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

  4. Chart - shows a comparative graphical representation of the most commonly triggered final message rules.

    Note

    Clicking on any of the rows will open a new tab with an email activity report specific to that value.

Products
Email Security
75300_1.png

In this screen you can create, edit, delete and reorder message rules. A message rule applies an action to a message if specific conditions are met.

Emails will be run by each rule until a Final Action is taken or all rules have been verified. The order of the rules in this screen determines the order that they are applied to each email.

Note

A set of system rules will be provided by default. In some cases these rules are sufficient for an organization and no further action is needed, however we recommend that you familiarize yourself with them.

Message rules are composed by:

  • Condition - one or more conditions can be applied to each rule. If all conditions are met, the assigned actions will be taken.

  • Action - one or more actions can be assigned to each rule. They indicate what actions will be taken if all conditions are met.

  • Final Action - a final action will be triggered once all the conditions are met and will stop all subsequent rules from being processed for this email.

Note

A rule will only be triggered if its Active status is set to On.

75300_2.png
  1. Priority - Message rules are executed in the order they appear in this list. Organize the rules to establish the order they will be applied to each individual message.

    Warning

    Changing the default order of rules might impact Email Security functionality. We recommend caution when adding a rule before the pre-made default rules.

  2. Direction - A Rule may be processed only against incoming mail, only against outgoing mail, or against both incoming and outgoing mail. The Direction column indicates when the Rule will be processed.

    • emaildownarrow.png - this rule will only be processed against incoming emails.

    • emailuparrow.png - this rule will only be processed against outgoing emails.

    • emaildownarrow.png emailuparrow.png - this email will be processed against all emails.

    Note

    Click on the column header to display a drop down menu that will allow you to filter out columns from the below display.

  3. Rule Name -Displays the name of each given rule.

    Note

    • A lock icon lock.png indicates that the rule cannot be edited or deleted.

    • System rules are marked by a gray background and a (Default) tag.

  4. Final Action - Shows if a Final Action is applied to a specific rule and what that final action is. The available final actions are:

    • Quarantine - puts the message in the user quarantine space. //link to personal quarantine section (mail digests) - mail digest is basically an email

    • Quarantine - Company - puts the message the global quarantine space to be verified by an administrator. //link to global quarantine section

    • Delete - deletes the message.

    • Deliver - delivers the message without any further rules being processed.

  5. Active - This column indicates if a rule is active or not. Clicking on the indicator will activate/deactivate the rule.

  6. Actions - there are two buttons available in this column:

    • 75300_3.PNG Change Rule - edit a specific rule.

    • 75300_4.png Delete Rule - delete a specific rule.

  7. View System Rules - toggle this button to display or hide system rules from the list below.

    Note

    You can use the emailsecurityrefresh.png Refresh button to refresh the list.

  8. Add Rule - create a new rule.

Use Connection Rules to limit the access to a specific mailbox or preemptively reject emails that fit certain criteria (such as emails of a specific size, or emails from a specific IP address).

Note

Connection Rules are processed before any message rules.

Connection rules will be processed until a Final Action is taken or all active rules have been verified.

Connection rules are composed by:

  • Condition - one or more conditions can be applied to each rule. If all conditions are met, the assigned actions will be taken.

  • Action - one or more actions can be assigned to each rule. They indicate what actions will be taken if all conditions are met.

  • Final Action - a final action will be triggered once all the conditions are met and will stop all subsequent rules from being processed.

75300_5.png
  1. Priority - Connection rules are executed in the order they appear in this list. Organize the rules to establish the order they will be applied to each individual message.

  2. Direction - A Rule may be processed only against incoming connections, only against outgoing connections, or against both incoming and outgoing connections. The Direction column indicates when the Rule will be processed.

    • emaildownarrow.png - this rule will only be processed against incoming connections.

    • emailuparrow.png - this rule will only be processed against outgoing connections.

    • emaildownarrow.png emailuparrow.png - this email will be processed against all connections.

    Note

    Click on the column header to display a drop down menu that will allow you to filter out columns from the below display.

  3. Rule Name -Displays the name of each given rule.

    • A lock icon lock.png indicates that the rule cannot be edited or deleted.

    • System rules are marked by a gray background and a (Default) tag.

  4. Final Action - Shows if a Final Action is applied to a specific rule and what that final action is. The available final actions are:

    • Permanent Reject - reject the connection. Any future attempts that meet the conditions of the rule will result in another reject.

    • Accept - accept the connection without any other rules being processed.

  5. Active - This column indicates if a rule is active or not. Clicking on the indicator will activate/deactivate the rule.

  6. Actions - there are two buttons available in this column:

    • 75300_3.PNG Change Rule - edit a specific rule.

    • 75300_4.png Delete Rule - delete a specific rule.

  7. View System Rules - toggle this button to display or hide system rules from the list below.

    Note

    You can use the emailsecurityrefresh.png Refresh button to refresh the list.

  8. Add Rule - create a new rule.

Use Custom Rule Data to create custom variable lists. Their main purpose is to enhance Message Rules and Connection Rules by providing customized data to compare emails against.

75300_6.png

Note

Clicking on one of items opens the data set for editing.

  1. Rule Data - Displays a list of previously created rule data sets. Rule Data provides a data set against which to compare emails.

  2. Rule RegEx - Contains a list of previously created Rule RegEx sets. Rule RegEx (regular expression) is a pattern that describes a certain syntax of text. Regular expressions allow you to compare against a specific string of words instead of comparing to every possible permutation of multiple words.

  3. Add new - adds a new data set.

  4. Delete - deletes the selected data set.

In Global Quarantine you can find the emails that triggered a message rule with a final action of Quarantine-Company. You need to fill in the search parameters and run a report to pull the quarantined emails matching your criteria.

75300_7_2.png
  1. Timespan - select a specific date range

  2. Quarantine - specify a quarantine tag. You can select between Spam, Virus or any custom tag created in custom quarantine // ad link

  3. Filters - show/hide search filters

  4. Run report - search for quarantined emails matching the parameters that you filled in

  5. Connection - specify the direction of the emails

  6. Content - fill in the following:

    • Sender - search for a specific sender

    • Recipient - search for emails sent to a specific mailbox

    • Title - search for emails with a specific subject line

    Note

    The system will use the values entered under Content to return both full or partial matches.

Once you hit the report button the results will be returned as shown below:

75300_8_2.png

Note

The report will contain the below columns, which can be filtered in or out from the dropdown menu next to the Subject column header.

  • Direction

  • Timestamp(UTC)

  • Timestamp(local)

  • Sender address

  • Sender IP

  • Subject

  • Recipient(s)

  • Size

  • Details

  1. Deny Options - take one the below actions for selected messages:

    • Deny sender - Block the email and any further emails sent to your server from the same sender.

    • Deny domain - Block the email and any further emails sent to your server from any address at the originating domain.

    • IP address - Block the email and any further emails sent to your server from any address at the originating IP address.

  2. Release options - take one of the below actions for the selected messages:

    • Release - removes the message from quarantine and places it in the receiver's inbox.

      Note

      This will have no effect on future emails from the same sender, domain or IP dress.

    • Safe sender - Release the email and add the sender's email address to your Global Safe List.

    • Safe domain - Release the email and add the sender's domain name to your Global Safe List.

    • IP address - Release the email and add the sender's IP address name to your Global Safe List.

  3. Color code - an indicator will be given to messages that trigger high spam scores. This will be either yellow for medium or red for severe.

    Warning

    Special care should be taken when managing these items.

  4. Select - select the message on this line in order to take action on it. Clicking on the top checkbox will select all messages returned by the report.

  5. More information - Safely preview a quarantined message.

    75300_9_2.png
    1. General - displays the following information:

      • Final action

      • Date

      • GUID - the sender email unique identifier

      • Sender IP

      • Size

    2. Actions - shows you the rules triggered by the message since received, the actions taken and relevant data.

    3. Attachments - provides information on the attachments contained by the email message.

    4. URLs - provides a list of all URLs contained in the email message.

    5. Headers - provides a detailed breakdown of all the message headers in this particular email.

    6. Preview - displays a safe preview of the email message.

    7. Message actions - provides three types of message actions:

      • Discard message - deletes the email message

      • Deny Options - provides the same options as it's namesake in the main Global Quarantine page.

      • Release Options -provides the same options as it's namesake in the main Global Quarantine page.

Spam Deny List contains Email addresses, IP addresses or domains that will be automatically rejected for all Email Security users.

Warning

The behavior of the Spam Deny List may be affected by Message Rules and Connection Rules.

Note

Items can be added to the list either directly from this screen, from custom message rule actions or from reviewing quarantined items.

75300_10.png
  1. Select Mailbox - toggle between global or individual spam deny lists

  2. Search list - search for a specific email address in the list.

    Note

    Both full and partial results will be returned.

  3. Preserve search when changing mailbox checkbox - keep your search parameter when selecting specific email addresses.

  4. Delete - delete the selected email addresses from the list.

  5. Add - add a specific email address to the list. You can add either a full email address, a domain ,or an IP address.

    Note

    • You can not add IP ranges.

    • You can not add domains that are attached to your Email Security account to your Safe List in domain form. Add the IP address(es) instead.

  6. Remove button - remove the email address on this row from the list.

Spam Safe List contains Email addresses, IP addresses, or domains that will be treated as safe for all Email Security users.

Warning

The behavior of the Spam Safe List may be affected by Message Rules and Connection Rules.

Note

Items can be added to the list either directly from this screen, from custom rule actions or from reviewing quarantined items.

75300_11.png
  1. Select Mailbox - toggle between global or individual quarantine lists

  2. Search list - search for a specific email address in the list.

    Note

    Both full and partial results will be returned.

  3. Preserve search when changing mailbox checkbox - keep your search parameter when selecting specific email addresses.

  4. Delete - delete the selected email addresses from the list.

  5. Add - add a specific email address to the list. You can either add a full specific email address, add a domain, or add an IP address .

    Note

    • You can not add IP ranges.

    • You can not add domains that are attached to your Email Security account to your Safe List in domain form. Add the IP address(es) instead.

  6. Remove button - remove the email address on this row from the list.

Mailboxes contains all the email addresses managed by your account. You can add multiple addresses from multiple domains either directly or by importing from Active Directory.

75300_12_2.png
  1. List Actions:

    • Add email - add an email address to the list

    • Refresh list - refresh the list of email addresses below

    • Import - import mailboxes from Exchange Online

  2. Search - search for a specific email address in the below list

  3. Email Address (Mailbox) - the columns displays all email addresses managed by your account.

    Note

    Double click on any of the email addresses to edit it.

  4. Real Name - Add a real name to improve the chances of emails being correctly identified by Message Rules. This is currently only supported through Active Directory synchronization.

  5. Exec Tracking - enable this checkbox to mark the email as belonging to a company executive for the purpose of the Executive Tracking Condition.

    Note

    You can activate executive tracking for specific Active Directory groups from Group Management.

  6. Manage Variants - add or remove multiple variants of a user's name to improve tracking (name variations, maiden names, middle names, etc.).

  7. Groups - add or remove the user from specific Active Directory Groups

  8. Aliases - associate multiple email addresses by the same user. //associate multiple addresses attached to a primary mailbox

  9. Delete - click the delete button to remove the email address on that specific row.

You can use the Group Management screen to see all the user groups supported on your system. Message Rules can take advantage of groups to perform specific actions for users in particular groups.

75300_13_2.png
  1. Add button - add a new group to the list

  2. Search - search for a specific group in the below list

  3. Group Name - the columns displays all groups managed by your account.

  4. Exec Tracking - check this box for all users that should be considered company executives. This option is used for the purpose of the Executive Tracking Condition.

  5. Delete - pressing on one of the delete buttons in the columns deletes the group on that row.

Use the Product Configuration screen to configure and customize your Email Security installation.

75300_14.png
1. Domains

Use the Domains tab to specify which domains will be protected by Email Security. Unless a domain is configured here, emails sent to and from mailboxes belonging to it will not be filtered through Email Security.

Note

Adding a new domain also creates in Inbound Mail route.

2. Inbound Mail

The Inbound Mail tab lists all of the inbound mail delivery routes that Email Security is aware of. Multiple inbound routes with different costs associated can be used to prioritize a specific route over others.

75300_15.png
3. Outbound Mail

The Outbound Mail tab lists all of the outbound mail delivery routes that Email Security is aware of. Multiple outbound can be used to prioritize or condition specific routes.

75300_16.png
4. Disclaimer

Use the Disclaimer tab to set up a template to attach to every email that originates from your domain. You can set up a disclaimer for each of your configured domains, for both html and plain text emails.

75300_17.png
  1. Domain - select the domain you want to create the disclaimer for. The default will apply for all domains that have a specific disclaimer created.

  2. Apply Changes - save the changes made to the disclaimer

  3. Activate this disclaimer - checking this box will add the disclaimer to all outbound emails on the selected domain.

5. Custom Quarantine

You can add additional quarantine statuses in the Custom Quarantine tab. Email Security comes with two default quarantine states of Spam and Virus. These can not be deleted or edited.

75300_18.png
  1. Name - Displays the name of all existing quarantine statuses.

  2. User access - indicates if users can access the quarantine through Personal Quarantine.Personal Quarantine

  3. Add button - create a new custom quarantine status.

  4. Remove domain button - deletes the custom quarantine status on that row.

6. Global Digest Settings

Use this tab to control the frequency with which Email Security sends reports with recent activity. You can establish the frequency, time slot and specific days of the week in which to send reports.

Note

Checking the Never Send box will stop sending reports.

75300_19.png
7. Digest and Branding

In the Digest and Branding tab you can edit the appearance of digest emails sent by Email Security.

Settings

The Administrators section allows you to view and manage a list of users that have access to the SecureMail end user portal.

75300_21.png
  1. Import button - import multiple accounts from a .CSV file.

  2. Add button - manually create a new user.

  3. Search field - search for an already existing account.

  4. Column descriptions - provides information on the data contained in each column. These include:

    • Full Name - the name of the person who the user belongs to.

    • Email(username) - the email address the user is assigned to.

    • Verified - shows if the user has activated their account and created a login password.

    • Role - the role assigned to each user.

    • Suspended - indicates if a user has been suspended. A suspended user can perform no actions within Email Security.

    • Redact - indicates whether sensitive information within reports should be redacted for this specific user.

    • MFA Enabled - indicates whether this user has enabled Multi-Factor Authentication for access to Email Security.

    • Password - if grayed out, indicates that the user has not activated their account and created a new password.

  5. Password button - change the user's password.

  6. Delete button - permanently removes the user.

The Active Directory section allows you to synchronize your Email Security account with one or more Active Directory domains.

Note

If the email addresses you import are not part of a domain that Email Security is already tracking, the new mailboxes will fail to import. You can add new domains by visiting Product Configuration. Mailboxes will also fail to import if they already exist.

75300_20.png
  1. Delete button - deletes the selected synchronized domain.

  2. Add button - synchronize a new domain.

  3. Source - AzureAD tenant name.

  4. Count - number of synchronized objects from AD.

Analytics

The Analytics allows you to run reports, pull up data and create various charts and archives.

75560_1.png
  1. Favourites - displays a list of previously saved reports or charts

  2. Reports & Charts list - shows you a list of available reports and charts. Clicking on one will display it in a new tab on the Active report & charts screen .

  3. Active report & charts screen - displays all reports and charts you have opened recently in separate tags. This allows you to toggle through multiple sets of data.

  4. Saved - this tab allows you to view a list of saved reports and charts, mark them as favorites, or delete them. licking on one will display it in a new tab on Active report & charts screen .

Reports and Charts

Below you can find a list of all available reports and charts

The Email Activity report is shows inbound and outbound e-mail activity processed by Email Security. It tracks and traces e-mail delivery and e-mail rules have been applied to the message during processing.

75560_3.png
  1. Timespan - select the time period you would like to run the report for.

  2. Filters - add additional conditions to filter out specific results.

    75560_4.png
    1. Connection

      • Sender IP - The IP address of the sender.

      • Direction - The direction of the email (inbound, outbound or both).

      • GUIDA - globally unique ID to identify the message (generated by the Email Security system).

    2. Rules

      • Message Rule - A Message Rule matched conditions and triggered during processing of the email.

      • Rule Action - the assigned action to the rule that triggered during processing of the email.

      • Delivery State - The final delivery state of the message (Delayed, Dropped or Delivered).

    3. Content

      • Sender -part of or the full email address of the sender

      • Recipient - part of or the full email address of the recipient

      • Exclude CC/BCC - Toggle including the CC/BCC fields in the search on/off.

      • Subject - part of or the full subject of the email your are looking for.

      • Verdict - the status of the email after being processed (e.g. Delivered, Rejected, Quarantined, Spam, Virus)

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Additional options

    • Download - send a copy of the report results via email

    • Save - save the settings and filters you have selected for future use

    • Manage products - go to Products > Product Configuration

  5. Results - displays the results of the report based on the settings and filters you have selected.

    Note

    To add or remove columns from the report click on any of the column headers and select the desired options from the drop down menu.

    The following columns are available in the report:

    • Direction - the direction of the email (inbound, outbound or both)

    • Timestamp (UTC) - the UTC timestamp that the Email Security service MTA processed the email, taking into account the product region in use

    • Timestamp (Local) - the local time of the user running the report. This is calculated using the browser offset and converting Timestamp (UTC)

    • Sender address - the sender's email address

    • Sender IP - the IP address of the sender

    • Subject - the subject of the message

    • Recipient(s) - the recipients of the message. If the message was addressed to multiple recipients a counter will apear (e.g. test@testdomain.com +2) next to the initial email address. To view CC and BCC header recipients, double click the message or click the details details.png icon.

    • Size - the size of the email

    • Verdict - the status of the message after processing (Delivered, Rejected, Quarantined, Spam, Virus)

    • Delivery State - the final delivery state of the message(Delayed, Dropped or Delivered)

    • Final Rule - the rule name that triggered the Final Action during processing.

    • Final Action - the Final Action that wasapplied to the message before processing was stopped

    • Delivered - whether or not the customer email server/service accepted the email for delivery. For full delivery logs, double click the message or click the details icon and then open the Server Log tab.

    • Verdict Details - Additional meta data that was set during rule processing.

    • Details - click on the details details.png icon to display additional information on the email

      • General - provides general information on the email:

        • Final Action - the final action taken by the triggered rule

        • GUID - the unique identifier of the sender email address

          Note

          Clicking on the GUID will display an Email Activity report based to the ID.

        • Sender - the sender email address

        • Sender IP - the sender IP address

        • Recipient(s) - the intended recipient email address

        • Subject - the subject line of the email

        • Extra Details - additional in-depth information

        • Size - the size of the email

      • Actions - rules triggered by the message since received, the actions taken and relevant data.

      • Attachments - attachments that are contained in the email

      • URLs - URLs or links contained in the email

      • Headers - email headers

      • Server log - the email server log

Email Volume shows the number of incoming and outgoing emails over a period of time.

75560_6.png
  1. Timespan - select the time period you would like to run the report for.

  2. Run report - runs a report based on the settings and filters you have selected.

  3. Chart - the chart is a comparative graphical representation of inbound and outbound email activity

  4. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

Inbound Email Activity shows the number of incoming emails over a period of time.

75560_7.png
  1. Timespan - select the time period you would like to run the report for.

  2. Run report - runs a report based on the settings and filters you have selected.

  3. Chart - the chart is a comparative graphical representation of inbound and outbound email activity

  4. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This chart shows of the most commonly triggered actions over a specific period of time.

75560_8.png
  1. Timespan - select the time period you would like to run the report for.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Chart - shows a comparative graphical representation of the most commonly triggered actions.

    Note

    Clicking on any of the rows will open a new tab with an email activity report specific to that value.

  5. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This chart shows the most commonly applied rules to messages over a specific period of time.

75560_9.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Chart - shows a comparative graphical representation of the most commonly applied message rules.

    Note

    Clicking on any of the rows will open a new tab with an email activity report specific to that value.

  5. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This chart shows the most commonly triggered final actions over a specific period of time.

75560_10.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Chart - shows a comparative graphical representation of the most commonly triggered final actions.

    Note

    Clicking on any section of the graph will open a new tab with an email activity report specific to that value.

  5. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This chart shows the most commonly applied final rules to messages over a specific period of time.

75560_11.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Chart - shows a comparative graphical representation of the most commonly applied final rules.

    Note

    Clicking on any of the rows will open a new tab with an email activity report specific to that value.

  5. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This report shows the users that received the most messages over a specific period of time.

75560_12.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Chart - shows a comparative graphical representation of the highest number of messages received per user.

    Note

    Clicking on any of the rows will open a new tab with an email activity report specific to that value.

  5. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This report shows the users that sent the most messages over a specific period of time.

75560_13.png
  1. Timespan - Change how far back email activity will be displayed.

  2. Results - Change the maximum number of results the chart will reference all values to.

  3. Run report - runs a report based on the settings and filters you have selected.

  4. Chart - shows a comparative graphical representation of the highest number of messages sent per user.

    Note

    Clicking on any of the rows will open a new tab with an email activity report specific to that value.

  5. Chart Context Menu

    • Print Chart

    • Download PNG image

    • Download SVG vector image

    • Download JPEG image

    • Download PDF document

    • Download from server - this sends an email with a PDF version of the chart to a chosen recipient

    • Save - save the report with the currently selected filters and settings for use at a later date

    • Save as - can be used when opening an already saved report to save a variation of the original.

This report shows the users that received the most messages marked as spam over a specific period of time.

This report shows the users that received the most messages marked as a virus threat over a specific period of time.