# 2. Reporting

<figure><img src="https://1888569782-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fj6f1XtdOtNUZVCRH9J44%2Fuploads%2FG4b3Qca7a0ctxQCJtxDu%2Fimage.png?alt=media&#x26;token=dd99d12b-a473-4098-8e9e-1e0831c32052" alt=""><figcaption></figcaption></figure>

#### 📖 Overview

The **Reporting** module provides structured, exportable security summaries based on email threat data collected across a specified date range. These reports help administrators and SOC analysts gain insight into:

* Phishing and spam trends
* Targeted users
* Source domains and email addresses
* Most attacked countries
* Content policy violations

> 🛡️ With one click, you can generate a full overview of the email threat landscape across your organization.

***

#### 🧾 Report Generation

At the top of the interface, select a **Start Date** and **End Date**, then click **Generate Report** to produce a new log-based analysis for that timeframe.

Each generated report includes:

* **Date Range**
* **Threat Score** (letter grade: A to F)
* **Creation Timestamp**
* **View Button** to access full details

> 📁 Reports are securely stored and viewable anytime within the panel.

<figure><img src="https://1888569782-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fj6f1XtdOtNUZVCRH9J44%2Fuploads%2Fa0uoZksLA6RNGXuewwuD%2Fimage.png?alt=media&#x26;token=72d4fa06-582d-4de0-9456-ab2fa4c8a4dd" alt=""><figcaption></figcaption></figure>

***

#### 📈 What the Report Includes

**🌍 Most Attacked Country Statistics**

* Heatmap and table showing where detected threats originate
* Helps identify geographic targeting trends
* Supports regional threat intelligence decisions

***

**📬 Targeted Recipients**

* **Email addresses most frequently attacked**
  * Indicates users at high risk of phishing or impersonation
* **Users receiving the most spam**
  * Reveals inboxes under heavy unsolicited email load

***

**✉️ Threat Sources**

* **Top attack-sending email addresses**
  * Identifies malicious or spoofed senders
* **Phishing email sender domains**
  * Domains used to trick users into entering sensitive data
* **Spam sender domains**
  * Domains responsible for the most unwanted or abusive email content

> 📌 These can be quickly added to blocklists from within the platform for immediate mitigation.

***

**📊 System Summary Chart**

* Pie chart visualization of total detected threats, by type:
  * Phishing
  * Spam
  * Content Filter Violations
* Helps prioritize focus areas for remediation and education efforts.

***

**📄 Content Filter Summary**

* Displays **most frequently blocked words** from emails
* Useful for tuning keyword-based content filters (e.g., blocklist for sales, adult terms, scams)

Example:

| Blocked Word | Detection Count |
| ------------ | --------------- |
| `discount`   | 1               |

***

#### 📋 Use Cases

| Goal                                 | Reporting Benefit                    |
| ------------------------------------ | ------------------------------------ |
| Prove security value to stakeholders | Share monthly threat summaries       |
| Identify vulnerable inboxes          | Focus user awareness training        |
| Track threat evolution               | Compare report scores over time      |
| Export for compliance or audits      | Archive PDF or CSV versions          |
| Feed data to SIEM or SOC             | Export structured intel from reports |

***

#### ⚙️ Best Practices

* Generate reports on a weekly or monthly basis
* Track score trends to evaluate improvements
* Block repeat sources found in multiple reports
* Cross-reference targeted users with login activity or incidents

***

> 🎯 The Reporting module transforms raw email security data into actionable intelligence — making it easier to detect, prove, and respond to threats across your organization.
