Top Spam Senders - ZyXEL Communications Vantage Report User Manual

User guide
Hide thumbs Also See for Vantage Report:
Table of Contents

Advertisement

Each field is described in the following table.
Table 148 Report > E-Mail Security > Spam > Summary > Drill-Down
LABEL
graph
Sender
Color
E-mail Spams
% of E-mail
Spams
View Logs
Total
Back

8.2.3 Top Spam Senders

Use this report to look at the top combinations of senders of spam messages and
the first SMTP server to which the sender sends spam. For example, if a sender
sends spam through two SMTP servers, there are two entries for the sender, one
with each SMTP server.
Vantage Report User's Guide
DESCRIPTION
The graph displays the information in the table visually.
Click the Pie View or the Bar View icon. You can specify the
Default Chart Type in System > General Configuration.
Move your mouse over a slice in the pie chart or a bar in the bar
chart to display its identification.
Click on a slice in the pie chart to move it away from the pie chart
a little.
This field displays the top combinations of senders of spam and the
first SMTP server to which spam is sent in the selected time interval,
sorted by the number of spam messages sent for each combination.
Each sender is identified by its e-mail address.
Each SMTP server is identified by its IP address. If DNS Reverse is
enabled in System > General Configuration, the table displays the
domain name, if identifiable, with the IP address (for example,
"www.yahoo.com/200.100.20.10").
This field displays what color represents each sender in the graph.
This field displays how many spam messages each sender sent.
This field displays what percentage of all spam messages in the
selected time interval was sent by each sender.
Click this icon to see the logs that go with the record.
This entry displays the totals for the senders above. If the number of
senders in the selected time interval is greater than the maximum
number of records displayed in this table, this total might be a little
lower than the total in the main report.
Click this to return to the main report.
Chapter 8 E-Mail Security
353

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report 3.0Vantage report 2.3

Table of Contents