Email Attachments Scanning Overview
Access this page from the Monitor menu.
A record is kept of all file metadata sent to the cloud for inspection. These are files downloaded by hosts and found to be suspicious based on known signatures From the main page, click the file’s signature to view more information, such as file details, what other malware scanners say about this file, and a complete list of hosts that downloaded this file.
Benefits of Viewing Scanned Email Attachments
Allows you to view a compiled list of suspicious email attachments all in one place, including the file hash, threat level, file name, and malware type.
Allows you to filter the list of email attachments by individual categories.
Export Data—Click the Export button to download file scanning data to a CSV file. You are prompted to narrow the data download to a selected time-frame.
The following information is available on this page.
Table 1: Email Attachments Scanning Data Fields
Field | Definition |
---|---|
File Signature | A unique identifier located at the beginning of a file that provides information on the contents of the file. The file signature can also contain information that ensures the original data stored in the file remains intact and has not been modified. |
Threat Level | The threat score. |
Date Scanned | The date and time the file was scanned. |
Filename | The name of the file, including the extension. |
Recipient | The email address of the intended recipient. |
Sender | The email address of the sender. |
Malware Name | The type of malware found. |
Status | Indicates whether the file was blocked or permitted. |
Category | The type of file. Examples: PDF, executable, document. |