The following table lists the mapping relationships between event types in the request and response.
|
Requested Event Type |
Returned Event Type |
Returned Event Subtype |
Sample of Returned details Parameter |
|---|---|---|---|
|
anti_spoof |
Domain-based Authentication |
Sender IP Match |
- |
|
SPF |
|||
|
DKIM |
|||
|
DMARC |
|||
|
DMARC - SPF |
|||
|
DMARC - DKIM |
|||
|
DMARC - Alignment |
|||
|
DMARC - Availability |
|||
|
threat |
Malware |
Predictive Machine Learning |
{
"threatNames": "Troj,SPY",
"fileInfo": [{
"fileName": "file1",
"fileSha256": "abcd1234dae60bcae54516be6c9953b4bb9644e188606ceac00feebf95bbf10e",
"threatName": "Troj,SPY"
}
]
}
|
|
Pattern-based scanning |
|||
|
Ransomware |
- |
|
|
|
Suspicious Objects |
Suspicious Files |
{
"fileInfo": [{
"fileName": "file1",
"fileSha256": "abcd1234dae60bcae54516be6c9953b4bb9644e188606ceac00feebf95bbf10e"
}
]
}
|
|
|
Suspicious URLs |
{
"urlInfo": [{
"url": "http://example.com",
"extractType": "body"
}
]
}
|
||
|
Advanced Persistent Threat |
Analyzed Advanced Threats (Files) |
{
"riskLevel": "3",
"fileInfo": [{
"fileName": "file1",
"fileSha256": "abcd1234dae60bcae54516be6c9953b4bb9644e188606ceac00feebf95bbf10e",
"riskLevel": "3"
}
]
}
|
|
|
Analyzed Advanced Threats (URLs) |
{
"riskLevel": "3",
"urlInfo": [{
"url": "http://example1.com",
"extractType": "attachment",
"attachmentName": "file1.zip",
"attachmentSha256": "30ce5b4bd4e74f258fea84746b18fdc4790828fc256419b51bf8bcc7e4d38ecc",
"riskLevel": "3"
}
]
}
|
||
|
Probable Advanced Threats Note:
The details parameter is returned only when the threat is detected by Social Engineering Attack Protection. |
{
"spamReport": {
"enginePatternVersion": "9.0.0.1006;27324006",
"spamResultHeader": "11-12.747600-7.000000",
"spamRidHeader": "wjdoQEOKyrY5rof3b4z0VOZgbl4O3Ko30zWxVR+05p1F5bM86HNXD6PFjJEFr+olq+Ty"}
}
|
||
|
Scan Exception |
Virtual Analyzer scan exception |
- |
|
|
Virtual Analyzer submission quota exception |
|||
|
Password protected attachment |
|||
|
Other exceptions |
|||
|
Web Reputation |
- |
{
"urlInfo": [{
"url": "http://example1.com",
"extractType": "attachment",
"attachmentName": "file1.zip",
"attachmentSha256": "abcd1234dae60bcae54516be6c9953b4bb9644e188606ceac00feebf95bbf10e"
}, {
"url": "http://example2.com",
"extractType": "attachment",
"attachmentName": "file2.zip",
"attachmentSha256": "ace8f873c55a3c0ee1d54a2dd1864a47bee3aab36cbeccd0a417e87054758756"
}
]
}
|
|
|
spam |
Spam |
- |
{
"spamReport": {
"enginePatternVersion": "9.0.0.1006;27324006",
"spamResultHeader": "11-12.747600-7.000000",
"spamRidHeader": "wjdoQEOKyrY5rof3b4z0VOZgbl4O3Ko30zWxVR+05p1F5bM86HNXD6PFjJEFr+olq+Ty"}
}
|
|
Graymail |
Marketing message and newsletter |
||
|
Social network notification |
|||
|
Forum notification |
|||
|
Bulk email message |
|||
|
phishing |
Phishing |
- |
{
"spamReport": {
"enginePatternVersion": "9.0.0.1006;27324006",
"spamResultHeader": "11-12.747600-7.000000",
"spamRidHeader": "wjdoQEOKyrY5rof3b4z0VOZgbl4O3Ko30zWxVR+05p1F5bM86HNXD6PFjJEFr+olq+Ty"}
}
|
|
Business Email Compromise (BEC) |
Detected by Antispam Engine |
||
|
Detected by writing style analysis |
|||
|
Suspected by Antispam Engine |
|||
|
content_filter |
Content |
- |
- |
|
Attachment |
- |
||
|
dlp |
Data Loss Prevention |
- |
- |
