Reporting & Analytics - Monitoring Information

This article contains information on monitoring email flow in Mimecast, including tools like the Delivery Queue, Message Center views for bounced, rejected, or held messages, logs for blocked attachments, data leak prevention, and Targeted Threat Protection.

The following pages can be used to monitor email flow:

Monitoring Message Flow This page provides viewers and queues that Administrators can use to monitor email flow.
Queue Retention Periods Mimecast tables, queues, and viewers display information on email data for a specific length of time.
Monitoring the Delivery Queue The Delivery Queue displays all emails (inbound and outbound) waiting to be delivered by Mimecast.
Message Center: Bounced Messages The Bounce Viewer provides Administrators with information on outbound and inbound messages that Mimecast was unable to deliver.
Message Center: Rejected and Deferred Messages The Rejection Viewer displays any messages that have been blocked by Mimecast in protocol.
Message Center: Monitoring Held Messages The Held Queue shows emails that have been held by Mimecast based on policy configuration.
Managing Blocked / Stripped and Linked Attachments Any attachment that is blocked or stripped and linked from an email based on Mimecast Attachment Policies is logged and available for release by an Administrator using Stripped Attachments.
The System Queue The System Queue displays all system notification messages that are currently being processed by Mimecast.
Targeted Threat Protection - URL Protect Logs Targeted Threat Protection builds on Mimecast's security services to protect organizations against the growing threat posed by advanced phishing and spear-phishing attacks in inbound email.
Backscatter Backscatter is a less-than-reputable service displaying characteristics of a money-making operation.
Monitoring Processing Before Mimecast can deliver emails, certain checks are performed, and the applicable policies need to be applied.
Administration Console: Monitoring Data Leak Prevention Monitor Data Leak Prevention by accessing log files in the Administration Console for understanding why content examination policies have been triggered.

 

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.