LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF โ€“ Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG
  2. 3. Analyzed

3.3 Mail

๐Ÿ“– Overview

The Mail submodule under the Analyzed section provides a complete forensic record of all analyzed email messages processed by ShieldsGuard SEG.

Each email is dissected into its components โ€” sender, recipient, content, attachments, URLs, and headers โ€” and is scanned for spam, phishing, malware, and policy violations.

๐Ÿ›ก๏ธ This is your central point of investigation for every threat, anomaly, or suspicious message caught by the email security gateway.


๐Ÿง  What Youโ€™ll See

Column
Description

Mail ID

Unique identifier for the email

Analysis Time

Timestamp when the email was scanned

Sender

Email address of the sender

Recipient

Email address of the recipient

Verdict

Final evaluation result

Actions

Detailed analysis button + blacklist/restore


๐Ÿงช Verdict Types

Verdict
Meaning

SPAM

Unsolicited or bulk email flagged by filters

PHISHING

Attempt to steal credentials or impersonate legitimate services

BLOCKED WORDS IN CONTENT

Message contains restricted keywords or phrases

SUSPICIOUS

Anomalous patterns but no confirmed malicious behavior

MAXIMUM FILE SIZE

Email contains attachment too large to analyze

๐Ÿ“Œ Emails with confirmed threats are automatically quarantined or blocked depending on policy.


๐Ÿ“ Email Detail Tabs

Clicking โ€œViewโ€ opens a multi-tab analysis window, breaking down the message into:

๐Ÿงท File Attachments

Lists all files extracted, scanned, and their verdicts (linked to 3.1 Files).

๐ŸŒ URL Analysis

Displays all embedded links, redirect paths, and verdicts (linked to 3.2 URL).

๐Ÿ“ญ Sender Domain

Identifies the domain reputation, historical behavior, and filter actions (linked to 3.4 Domain).

โœ‰๏ธ Mail Details

Header data, SPF/DKIM/DMARC result, and message metadata.


๐Ÿ” Use Cases

Goal
How the Mail module helps

Investigate a suspicious email

See full metadata, attachments, and URLs

Trace phishing attempts

Filter verdict by PHISHING and review target users

Identify high-risk senders

Review senders that appear repeatedly

Validate false positives

Re-analyze mail verdict and override manually


โš™๏ธ Analyst Tools

  • Filter by Verdict (PHISHING, SPAM, etc.)

  • Search by Mail ID, Sender, or Recipient

  • Blacklist sender domain directly from action panel

  • Restore messages (if applicable) from quarantine


๐Ÿง  Best Practices

Action
Benefit

Investigate all PHISHING verdicts

Prevent credential harvesting and fraud

Monitor SUSPICIOUS verdicts daily

Spot new or stealthy attack methods

Cross-reference file and URL tabs

Understand full attack chain

Use sender domain tab for blacklist ops

Block entire source infrastructure if repeated


๐ŸŽฏ The Mail module is the forensic foundation of your SEG โ€” giving you everything you need to investigate, trace, and respond to email-based threats in depth.

Previous3.2 URLNext3.4 Domain

Last updated 9 days ago