Spam Reports - Firewall Reports


The Spam Reports section includes reports that show details on spam that have been detected by the firewall. These reports help in identifying the top spam that have affected the network, analyze the extent of damage, and also track the source of the spam attack.

How to export report in PDF, CSV, XLS formats, on demand?

The Top Spam Generator report shows the source of generation for each spam with sender Email address and the number of times the spam was sent.

In this report you will see the following details: 

FieldDescription
HostThe host or IP address that generates the Spam
SenderSender Email address
HitsNumber of spam mail sent
% Hits 

Drilling down the graph or table will give destination host name or IP address, sender Email address, recipient Email address, mail protocol used and hits.

The Top Spam Receivers report shows the top destination IP addresses or host names that have been receiving Spam, along with the recipient Email address and the number of times the spam was received.

In this report you will see the following details: 

FieldDescription
DestinationThe host or IP address that generates the Spam
RecipientRecipient Email address
HitsThe number of times the Spam was sent by the same host

Drilling down the graph or table will give destination host name or IP address, sender Email address, recipient Email address, mail protocol used and hits.

The Top Spam Rules table shows the overall top spam rules that have been triggered across this firewall. The table below the graph shows the rule triggered, and the number of hits.

In this report you will see the top spam rules got triggered and the number of times the rule got triggered.

FieldDescription
Rule Number/IDThe Spam rule number/ID which was triggered
HitsThe number of times the Spam rule was triggered

Drilling down the graph or table will give destination host name or IP address, sender Email address, destination host name or IP address, recipient Email address, mail protocol used, status of the spam and count.

 

Thank you for your feedback!

Was this content helpful?

We are sorry. Help us improve this page.

How can we improve this page?
Do you need assistance with this topic?
By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.
A single platter for comprehensive Network Security Device Management