Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Email Attachments Scanning Overview

Access this page from the Monitor menu.

A record is kept of all file metadata sent to the cloud for inspection. These are files downloaded by hosts and found to be suspicious based on known signatures From the main page, click the file’s signature to view more information, such as file details, what other malware scanners say about this file, and a complete list of hosts that downloaded this file.

Benefits of Viewing Scanned Email Attachments

  • Allows you to view a compiled list of suspicious email attachments all in one place, including the file hash, threat level, file name, and malware type.

  • Allows you to filter the list of email attachments by individual categories.

Export Data—Click the Export button to download file scanning data to a CSV file. You are prompted to narrow the data download to a selected time-frame.

The following information is available on this page.

Table 1: Email Attachments Scanning Data Fields



File Signature

A unique identifier located at the beginning of a file that provides information on the contents of the file. The file signature can also contain information that ensures the original data stored in the file remains intact and has not been modified.

Threat Level

The threat score.

Date Scanned

The date and time the file was scanned.


The name of the file, including the extension.


The email address of the intended recipient.


The email address of the sender.

Malware Name

The type of malware found.


Indicates whether the file was blocked or permitted.


The type of file. Examples: PDF, executable, document.