LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG

1. SEG Dashboard

Previous11. Edit PageNext2. Reporting

Last updated 9 days ago

📖 Overview

The SEG Dashboard (Secure Email Gateway Dashboard) provides a centralized view of your email security posture. It displays live analytics, user activities, and threat intelligence associated with the inbound and outbound email traffic passing through ShieldsGuard’s filtering infrastructure.

This dashboard acts as the command center for monitoring phishing, malware, spam, and content policy enforcement in real time.


📊 Threat Metrics Overview

The top panel offers real-time summaries of four core threat categories:

Category
Description

Phishing

Attempts to trick users into revealing sensitive information via email (e.g., fake login pages)

Malware

Emails containing malicious attachments or links

Spam

Unsolicited or bulk email categorized as junk

Content Filter

Violations of configured content policies (e.g., blocked file types, sensitive keywords)

Each box shows:

  • Total blocked emails

  • Percentage of total filtered emails

  • Color-coded risk indicator (blue/green/red/orange)


📋 Security Events Panel

This table displays detailed forensic records of any detected threat.

Field
Description

Analysis Time

Timestamp when email was scanned

Verdict

Result of the analysis (e.g., Blocked, Clean)

Reason

Detected threat type or violated rule

If no threats are detected, the table will indicate an empty status with a success message.


🧑‍💼 User Activities Panel

Tracks end-user interactions with the email system.

Field
Description

User

Email address of the user

Action

Login activity or message interaction (e.g., read)

Date

Timestamp of the action

🧠 Useful for security auditing, behavior analysis, and insider threat monitoring.


🌍 Email Threat Map

Displays geolocated sources of email-based threats on a global map.

  • Real-time pinpointing of phishing or malware origins

  • Helps identify targeted attack regions or patterns

  • Color-coded intensity by threat type and frequency


📈 Email Statistics Graph

A timeline-based chart showing categorized email security trends such as:

Legend Category
Meaning

🔵 Blocked Words

Detected keywords in content

⚫ No Threat Found

Safe emails

🟠 Suspicious

Suspicious but not blocked content

🔴 Phishing, Spam

Confirmed threats

🟤 Maximum File Size

Exceeds allowed attachment limit

The graph provides a historical overview and trends for daily/weekly security metrics.


✅ Use Cases

Scenario
Dashboard Benefit

SOC visibility

Real-time monitoring of email threat flow

End-user auditing

Track user access and interactions

Threat landscape awareness

Map-based geointel of where threats originate

Incident response readiness

Quickly identify and isolate infected users


🛡️ Why It Matters

Email is still the #1 vector for:

  • Ransomware

  • Credential theft

  • Business email compromise (BEC)

  • Insider abuse

The SEG Dashboard ensures you're not blind to any of it.


🎯 The SEG Dashboard gives you clarity, visibility, and control over the most exploited attack surface in cybersecurity: email. Know what’s being blocked, what’s being delivered, and who’s interacting with it.