3.3 Mail
๐ Overview
The Mail submodule under the Analyzed section provides a complete forensic record of all analyzed email messages processed by ShieldsGuard SEG.
Each email is dissected into its components โ sender, recipient, content, attachments, URLs, and headers โ and is scanned for spam, phishing, malware, and policy violations.
๐ก๏ธ This is your central point of investigation for every threat, anomaly, or suspicious message caught by the email security gateway.
๐ง What Youโll See
Mail ID
Unique identifier for the email
Analysis Time
Timestamp when the email was scanned
Sender
Email address of the sender
Recipient
Email address of the recipient
Verdict
Final evaluation result
Actions
Detailed analysis button + blacklist/restore
๐งช Verdict Types
SPAM
Unsolicited or bulk email flagged by filters
PHISHING
Attempt to steal credentials or impersonate legitimate services
BLOCKED WORDS IN CONTENT
Message contains restricted keywords or phrases
SUSPICIOUS
Anomalous patterns but no confirmed malicious behavior
MAXIMUM FILE SIZE
Email contains attachment too large to analyze
๐ Emails with confirmed threats are automatically quarantined or blocked depending on policy.
๐ Email Detail Tabs
Clicking โViewโ opens a multi-tab analysis window, breaking down the message into:
๐งท File Attachments
Lists all files extracted, scanned, and their verdicts (linked to 3.1 Files).
๐ URL Analysis
Displays all embedded links, redirect paths, and verdicts (linked to 3.2 URL).
๐ญ Sender Domain
Identifies the domain reputation, historical behavior, and filter actions (linked to 3.4 Domain).
โ๏ธ Mail Details
Header data, SPF/DKIM/DMARC result, and message metadata.
๐ Use Cases
Investigate a suspicious email
See full metadata, attachments, and URLs
Trace phishing attempts
Filter verdict by PHISHING and review target users
Identify high-risk senders
Review senders that appear repeatedly
Validate false positives
Re-analyze mail verdict and override manually
โ๏ธ Analyst Tools
Filter by Verdict (PHISHING, SPAM, etc.)
Search by Mail ID, Sender, or Recipient
Blacklist sender domain directly from action panel
Restore messages (if applicable) from quarantine
๐ง Best Practices
Investigate all PHISHING verdicts
Prevent credential harvesting and fraud
Monitor SUSPICIOUS verdicts daily
Spot new or stealthy attack methods
Cross-reference file and URL tabs
Understand full attack chain
Use sender domain tab for blacklist ops
Block entire source infrastructure if repeated
๐ฏ The Mail module is the forensic foundation of your SEG โ giving you everything you need to investigate, trace, and respond to email-based threats in depth.
Last updated