Mimecast Web Security: Security Report

Document created by user.oxriBaJeN4 Employee on Sep 13, 2018Last modified by user.oxriBaJeN4 Employee on Oct 1, 2018
Version 9Show Document
  • View in full screen mode

This guide describes how to view the Security Report in Mimecast Web Security. It displays a log of security threat data, gathered from user activity in your organization.


From the Security Report administrators can:

  • Apply specific filters to create a custom report.
  • Customize the data so only the most relevant information displays.
  • Export specific data in a downloadable report.


Accessing the Security Report


To access the Security Report:

  1. Log on to the Administration Console.
  2. Click on the Administration menu item. A drop down menu is displayed.
  3. Click on the Web Security | Security Report menu item. The most recent threat activity displays in the following columns:
    UserThe user the request came from.
    Source IPThe source IP the request came from.
    RequestThe URL or domain of the site the user attempted to access.
    ThreatDisplays the type of threat as outlined below:
    • Anti Virus: A virus related threat that was found to be infected or unscannable.
    • New Domain: A newly observed domain.
    • Similarity Check: A domain found to be similar to another known domain.
    • Security Category: A request matching a security related category type.
    DetailsDisplays the response to the threat.
    CreatedDisplays the time of the request.


Customizing the Security Report 


You can customize the data displayed and filter search results with the following features:


Searching Data


Searching ReportTo search for particular activity:

  1. Optionally filter the search results. Click on the All pull down menu and select one of the following:
    • User: Searches for users.
    • Source IP: Searches for the source IP.
    • Request: Searches for the request.
  2. Enter known search criteria in the Search field.
  3. Press on the Enter key, or click on the search icon. Your results display.

Security Report FiltersApplying Filters


To filter activity by the type of security threat:

  1. Click on the Filters drop down menu.
  2. Select the boxes of the filters you wish to display. 
  3. Alternatively click on the Select all / Deselect all links to toggle all selections, and make small adjustments.
  4. Click on the Apply button. 


Customizing the Display


To display threat activity within a certain date range:

  1. Click on the Date Range drop down menu.
  2. Select a date range (from 24 hours to 90 days past). 


To customize the columns displayed:

  1. Click on the Settings icon in the far right corner of the logs.
  2. Check the boxes of the columns you wish to view.
  3. Click on the Apply button. 


See Also...