Email Defence Service: Message Details

By clicking on the green eye button placed at the end of each result, you can access the message detail page.
The message detail page has a general email data section and 5 additional sections containing advanced information. All the sections will be explored in depth below.

picture1

In the first section displays basic information about the message, and the message badges are located in the top right corner.

The first badge represents the SEARCH RESULTS EXPLAINED, the second one represents the last action the Email Security performed on the message (quarantined, delivered, deferred etc…).

  • Subject (as section title)
  • From (the email address where the email is from)
  • Date (the date when the email landed on the service)
  • To (the email address where the email should be delivered)
  • Risk Confidence (a security estimation such as phishing, malware, business compromise emails etc…)
  • Spam Confidence (a junk estimation such as spam, newsletter emails etc…)

picture2You can perform many operations for the message you are analyzing:

  • Add to Welcomelist (you can choose between the sender IP address or the sender email address)
  • Add to Blocklist (you can choose between the sender IP address or the sender email address)
  • Rescan (put the message in the scanning queue of the service aiming to get a different scanning result, in case where there are changes to the service settings)
  • Release (or Release to (specified address(es)) by clicking on the arrow to the right on the button
  • Delete (completely remove the message from the service)
  • Mark as (this message will be learned by the bayesian engine as good or bad)
  • Submit as (submit the message, as good in case of false positive or bad in case of false negative, to us for further analysis)
  • View Body (view the email body directly from the EDS interface)

picture3

INFORMATION
In this tab, we display both general and detailed information about the message.

Overview
In the first section of the information tab, we show an overview of the message. We also include less general email information such as the Message ID, the Email Size, the Scan Time, and the Sender IP address.

picture4

Authentication
In the second section are shown the authentication results of the message. In this section, we display the results of the SPFDKIM, and DMARC checks.

picture5

URIs
In the third section, we display the URIs contained in the email body.

picture6

By clicking on the magnifier icon at the end of each URI you can see the URI details and what action the URLS and engine performed. You are also able to search it in all the other messages on the service, or search it on VIRUS TOTAL.

picture7

Headers
In the fourth section of the tab, we display the email headers. You can analyze them better by displaying them in a raw format by clicking on the View raw headers link.

picture8

ADAPTIVE TRUST ENGINE
In this section, we display all information provided by the Adaptive Trust Engine (ATE) about the message.

Relationship
In the first section, we display the Adaptive Trust Engine relationship data between all the email addresses involved in the email.

The most important data point is the Strength indicator. This bar indicates the amount of traffic between the sender and recipient. Generally speaking, a phishing or malicious email is less likely to be sent through a bi-directional communication between two people who have a history.

picture9

Messages Exchanged
In the second section is shown a chart representing how many messages landed on the service from this email address and domain.

picture10

SECURITY ANALYSIS
Here we display the scan results and any action taken by EDS to keep your inbox safe.

Dangerous Checks
In this section, we display all the scan results and any action taken to sanitize potentially dangerous content like URLs, attachments, hidden code etc…

picture11

Antispam Checks
In this section, we display all antispam scan results and any block/welcome list interventions. The most important value is the Spam Score. This score is the sum of all scores of the triggered rules shown by clicking the View full spam report link.

picture12

DATA LOSS PREVENTION
In this section we display Data Loss Prevention rules, and whether any have been triggered. These rules prevent critical data sharing if not authorized.

picture13

DELIVERY
In this tab, we display all of the delivery information for the message.

Received
In the upper section of the delivery tab, we display the message delivery trace. This trace is useful to debug delivery issues.
For each hop, we display common information such as the IP address, the Reverse hostname, the Country, and the delivery Delay.

picture14

Deliveries
In the second section, we display all the delivery related information such as the DSN, the Relayed to IP address, the Relay Reply, the delivery Date, and the delivery Delay.

picture15

Path Map
In the third section, you’ll find the email trace on a world map to better understand where the email is coming from and where the delivery hops are located.

picture16

Received Delays
In the last section, we display how many seconds the message waited to leave the hop to reach the next. This tool is useful to drill down to which host is slowing down the delivery process.

picture17

Leave a Reply