Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Quarantined Emails Overview

Access this page from the Monitor > Emails menu.

The Quarantined Emails monitor page lists quarantined emails with their threat score and other details including sender and recipient. You can also take action on quarantined emails here, including releasing them and adding them to the blocklist.

The following information is available from the Summary View:

Table 1: Emails Summary View

Field

Description

Time Range

Use the slider to narrow or increase the time-frame within the selected the time parameter in the top right: 12 hrs, 24 hrs, 7 days or custom.

Total Email Scanned

This lists the total number of emails scanned during the chosen time-frame and then categorizes them into blocked, quarantined, released, and permitted emails.

Malicious Email Count

This is a graphical representation of emails, organized by time, with lines for blocked emails, quarantined and not released emails, and quarantined and released emails.

Emails Scanned

This is a graphical representation of emails, organized by time, with lines for total emails, and emails with one or more attachments.

Email Classification

This is another graphical view of classified emails, organized by percentage of blocked emails, quarantined and not released emails, and quarantined and released emails.

The following information is available from the Details View:

Table 2: Emails Details View

Field

Description

Recipient

The email address of the recipient.

Sender

The email address of the sender.

Subject

Click the Read This link to go to the Juniper ATP Cloud quarantine portal and preview the email.

Date

The date the email was received.

Malicious Attachment

Click on the attachment name to go to the Juniper ATP Cloud file scanning page where you can view details about the attachment.

Size

The size of the attachment in kilobytes.

Threat Score

The threat score of the attachment, 0-10, with 10 being the most malicious.

Threat Name

The type of threat found in the attachment, for example, worm or trojan.

Action

The action taken, including the date and the person (recipient or administrator) who took the action.

Using the available buttons on the Details page, you can take the following actions on blocked emails:

  • Add domain to blocklist

  • Add sender to blocklist

  • Release