Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQs
Release Notes
Contents  

SMTP Quarantine Overview

Access this page from the Monitor menu.

The SMTP quarantine monitor page lists quarantined emails with their threat score and other details including sender and recipient. You can also take action on quarantined emails here, including releasing them and adding them to the blacklist.

The following information is available from the Summary View:

Table 31: Blocked Email Summary View

Field

Description

Time Range

Use the slider to narrow or increase the time-frame within the selected the time parameter in the top right: 12 hrs, 24 hrs, 7 days or custom.

Total Email Scanned

This lists the total number of emails scanned during the chosen time-frame and then categorizes them into blocked, quarantined, released, and permitted emails.

Malicious Email Count

This is a graphical representation of emails, organized by time, with lines for blocked emails, quarantined and not released emails, and quarantined and released emails.

Emails Scanned

This is a graphical representation of emails, organized by time, with lines for total emails, and emails with one or more attachments.

Email Classification

This is another graphical view of classified emails, organized by percentage of blocked emails, quarantined and not released emails, and quarantined and released emails.

The following information is available from the Detail View:

Table 32: Blocked Email Detail View

Field

Description

Recipient

The email address of the recipient.

Sender

The email address of the sender.

Subject

Click the Read This link to go to the Sky ATP quarantine portal and preview the email.

Date

The date the email was received.

Malicious Attachment

Click on the attachment name to go to the Sky ATP file scanning page where you can view details about the attachment.

Size

The size of the attachment in kilobytes.

Threat Score

The threat score of the attachment, 0-10, with 10 being the most malicious.

Threat Name

The type of threat found in the attachment, for example, worm or trojan.

Action

The action taken, including the date and the person (recipient or administrator) who took the action.

Using the available buttons on the Details page, you can take the following actions on blocked emails:

Related Documentation

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit