![Symantec 10744983 - Mail Security 8320 Administration Manual Download Page 187](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785187.webp)
Table 9-6
Available Sender Authentication reports
(continued)
Required Data
Storage
Options
Displays...
Report Type:
Senders
Email addresses from which the most successful
sender authentication attempts have been detected.
For each email address, the total messages processed
and number and percentage of successful sender
authentication attempts are listed.
Top Succeeded
Senders
Senders
Email addresses from which the most failed sender
authentication attempts have been detected. For each
email address, the total messages processed and
number and percentage of failed sender
authentication attempts are listed.
Top Failed
Senders
Table 9-7
describes the available SMTP connection reports.
Table 9-7
Available SMTP connection reports
Required Data
Storage
Options
Displays...
Report Type:
None
Number and percentage of SMTP connections
attempted, successful, failed, rejected, and deferred.
Overview
Sender IP
connections
IP addresses from which the most successful SMTP
connections were detected.
Top Succeeded
Connections
Sender IP
connections
IP addresses from which the most failed SMTP
connections were detected.
Top Failed
Connections
Sender IP
connections
IP addresses from which the most rejected SMTP
connections were detected.
Top Rejected
Connections
Table 9-8
describes the available Spam Quarantine report.
187
Working with Reports
Choosing a report
Summary of Contents for 10744983 - Mail Security 8320
Page 1: ...Symantec Mail Security Administration Guide...
Page 8: ......
Page 14: ...Glossary Index Contents 14...
Page 22: ...About Symantec Mail Security Where to get more information 22...
Page 68: ...Configuring email settings Configuring scanning settings 68...
Page 130: ...Configuring email filtering Managing policy resources 130...
Page 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Page 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Page 176: ...Configuring alerts and logs About logs 176...
Page 220: ...Administering the system Periodic system maintenance 220...