Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Email Attachments Scanning Overview

Access the Email Attachments page from the Monitor > Files > Email Attachments menu.

Benefits of Viewing Scanned Email Attachments

  • Allows you to view a compiled list of suspicious email attachments all in one place, including the file hash, threat level, filename, and malware type.

  • Allows you to filter the list of email attachments by individual categories.

Export Data—Click the Export button to download file scanning data to a CSV file. You are prompted to narrow the data download to a selected time-frame.

The following information is available on this page.

Table 1: Email Attachments Scanning Data Fields

Field

Definition

Detection Engine

Displays the name of the detection engines with the highest confidence in threat detection. For more information, see Table 2.

Other detection engines can also reach the same verdict.

Signature ID / SHA-256

If applicable, the Signature ID uniquely identifies the signature that is triggered for this detection; otherwise, the SHA-256 file hash is displayed.

  • If a full file is uploaded to the Juniper ATP Cloud, a hash of the file is displayed in this column.

  • If the file is blocked and the transfer is interrupted on the SRX Series Firewall, a Signature ID is displayed.

Threat Level

The threat score

Date Scanned

The date and time the file was scanned.

Filename

The name of the file, including the extension

Recipient

The email address of the intended recipient

Sender

The email address of the sender

Malware Name

The type of malware found

Status

Indicates whether the file was blocked or permitted.

Category

The type of file. Examples: Portable Document Format, executable, document