![Symantec 10744983 - Mail Security 8320 Скачать руководство пользователя страница 185](http://html1.mh-extra.com/html/symantec/10744983-mail-security-8320/10744983-mail-security-8320_administration-manual_1418785185.webp)
Table 9-4
Available Content Compliance reports
(continued)
Required Data
Storage
Options
Displays...
Report Type:
Sender HELO
domains
SMTP HELO domain names from which the most
compliance matches have been detected. For each
HELO domain, the total messages processed and
number and percentage of content-compliance
policies triggered are listed. Specify the maximum
number of HELO domains to list for the specified time
range.
Top Sender
HELO Domains
Sender IP
connections
IP addresses from which the most compliance matches
have been detected. For each IP address, the total
messages processed and number and percentage of
content-compliance policies triggered are listed.
Specify the maximum number of IP addresses to list
for the specified time range.
Top Sender IP
Connections
Recipient
domains
Recipient domains for which the most compliance
matches have been detected. For each recipient
domain, the total messages processed and number
and percentage of content-compliance policies
triggered are listed. Specify the maximum number of
recipient domains to list for the specified time range.
Top Recipient
Domains
Recipients,
Recipient
domains
Email addresses for which the most compliance
matches have been detected. For each email address,
the total messages processed and number and
percentage of content-compliance policies triggered
are listed. Specify the maximum number of email
addresses to list for the specified time range.
Top Recipients
Recipients,
Recipient
domains
Number of compliance policies triggered for a
recipient email address that you specify. For each
grouping, the total messages processed and number
and percentage of content-compliance policies
triggered are listed.
Specific
Recipients
None
Names of the most common compliance matches,
number of policies triggered, and percentage of
policies triggered versus total processed messages.
Top Policies
Table 9-5
describes the available Attack reports.
185
Working with Reports
Choosing a report
Содержание 10744983 - Mail Security 8320
Страница 1: ...Symantec Mail Security Administration Guide...
Страница 8: ......
Страница 14: ...Glossary Index Contents 14...
Страница 22: ...About Symantec Mail Security Where to get more information 22...
Страница 68: ...Configuring email settings Configuring scanning settings 68...
Страница 130: ...Configuring email filtering Managing policy resources 130...
Страница 156: ...Working with Spam Quarantine Configuring Spam Quarantine 156...
Страница 164: ...Working with Suspect Virus Quarantine Configuring Suspect Virus Quarantine 164...
Страница 176: ...Configuring alerts and logs About logs 176...
Страница 220: ...Administering the system Periodic system maintenance 220...