LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG

2. Reporting

Previous1. SEG DashboardNext3. Analyzed

Last updated 9 days ago

📖 Overview

The Reporting module provides structured, exportable security summaries based on email threat data collected across a specified date range. These reports help administrators and SOC analysts gain insight into:

  • Phishing and spam trends

  • Targeted users

  • Source domains and email addresses

  • Most attacked countries

  • Content policy violations

🛡️ With one click, you can generate a full overview of the email threat landscape across your organization.


🧾 Report Generation

At the top of the interface, select a Start Date and End Date, then click Generate Report to produce a new log-based analysis for that timeframe.

Each generated report includes:

  • Date Range

  • Threat Score (letter grade: A to F)

  • Creation Timestamp

  • View Button to access full details

📁 Reports are securely stored and viewable anytime within the panel.


📈 What the Report Includes

🌍 Most Attacked Country Statistics

  • Heatmap and table showing where detected threats originate

  • Helps identify geographic targeting trends

  • Supports regional threat intelligence decisions


📬 Targeted Recipients

  • Email addresses most frequently attacked

    • Indicates users at high risk of phishing or impersonation

  • Users receiving the most spam

    • Reveals inboxes under heavy unsolicited email load


✉️ Threat Sources

  • Top attack-sending email addresses

    • Identifies malicious or spoofed senders

  • Phishing email sender domains

    • Domains used to trick users into entering sensitive data

  • Spam sender domains

    • Domains responsible for the most unwanted or abusive email content

📌 These can be quickly added to blocklists from within the platform for immediate mitigation.


📊 System Summary Chart

  • Pie chart visualization of total detected threats, by type:

    • Phishing

    • Spam

    • Content Filter Violations

  • Helps prioritize focus areas for remediation and education efforts.


📄 Content Filter Summary

  • Displays most frequently blocked words from emails

  • Useful for tuning keyword-based content filters (e.g., blocklist for sales, adult terms, scams)

Example:

Blocked Word
Detection Count

discount

1


📋 Use Cases

Goal
Reporting Benefit

Prove security value to stakeholders

Share monthly threat summaries

Identify vulnerable inboxes

Focus user awareness training

Track threat evolution

Compare report scores over time

Export for compliance or audits

Archive PDF or CSV versions

Feed data to SIEM or SOC

Export structured intel from reports


⚙️ Best Practices

  • Generate reports on a weekly or monthly basis

  • Track score trends to evaluate improvements

  • Block repeat sources found in multiple reports

  • Cross-reference targeted users with login activity or incidents


🎯 The Reporting module transforms raw email security data into actionable intelligence — making it easier to detect, prove, and respond to threats across your organization.