Analyzing alerts

This guide provides step-by-step instructions for analyzing Quarantine and EmployeeShield alerts as well as Phish911 reports utilizing the Graphus investigate modal.

Investigate modal

When Graphus takes action related to one of the protection methods, it creates an alert in the applicable alert table. This is an example of the Quarantine alert table.

The Investigate modal is displayed when clicking the Date Created link in one of the alert tables. The modal provides you with a variety of tools for investigating Quarantine, EmployeeShield, and Phish911 alerts.

Alert Details

The Alert Details tab is a good place to start your investigation as it summarizes the alert and indicates the reason Graphus created the alert.

NOTE  The Phish911 alert table does not include the Alert Details tab.

The key fields are the following:

  • Category: Indicates the attack category as determined by Graphus.
  • Indicator: Provides the reason Graphus took action on this specific email.
  • Quarantined: Shows if the email is still quarantined.

Events table

The Events table tracks the date and time alert-related events occurred. Events include the following:

  • User chose to reply
  • Opened by user
  • Quarantined by admin
  • Admin reported false+ve (false positive)
  • Automatically quarantined by system
  • Quarantined by user
  • User chose to investigate
  • Un-Quarantined by admin
  • Automatically closed by system
  • Created
  • User reported false+ve (false positive)
  • Closed

EmployeeShield Feedback table

The feedback table appears in the EmployeeShield alert table and provides information regarding actions taken on the banner by the recipient.

The possible actions that will appear in the Feedback column:

  • Warning banner read by the recipient
  • Original message viewed
  • Original message deleted
  • Warning banner deleted by the recipient
  • Warning banner archived by the recipient


MetaData

The MetaData tab displays important data about the email itself. This includes sender data such as the Sender Name, Sender Email Address and Return Path Address.

In the Authentication Results section, you can see whether the email passed or failed the authentication protocol. Failing authentication is a strong indication that the email may have been spoofed.

The sender's country of origin and the IP address of the server's Mail Transfer Agent (MTA) are conveyed in the Sender MTA section.

The Recipient's section shows the list of email recipients, any URLs or attachments the email contains, and the current folder in which the email is located.

Email Header

Detailed metadata information can be found on the Email Header tab via an API call into the recipient's inbox. This includes specific details about the path the email took to arrive.

Safe View

The text-only version of the actual email is displayed on the Safe View tab via an API call into the recipient's inbox.

Original View

The Original View tab shows the email the same way the recipient would see it, meaning with images, formatting, links, etc. This is done via an API call into the recipient's inbox.

Sandbox

On the Sandbox tab, you can submit the URLs or attachments from the email to a network of well-known anti-virus providers. Graphus will never submit your original files. It only submits hashes of your files. If the file comes back as unknown or unrated, you can submit the file manually outside of Graphus to a provider of your choice.

NOTE  The Sandbox tab will only be visible in the modal if the email includes a URL or attachment. The processing of a URL or attachment might take a few minutes. If you don't see any results after clicking the Retrieve Results button, wait and try it again a little bit later.

How to...