Encryption Services - View Summary Reports


Active encryption services, see Add Hosted Services.


This article will demonstrate how to view a Summary Report.

1. In a web browser navigate to the ITSolutionsNow encrypted mail gateway:


2. Login using the administrative credentials supplied for the mail encryption services
Please note these credentials are not the same used to access email, and are unique to the client space. To request credentials either click the, "Forgot Password," link or email with the account holder name, domain name, and last four digits of the billing credit card.



3. After a successful login locate the Reports section and click the link for Summary Reports..



4. The Summary Reports page will load after a few brief moments. Alternative data ranges may be viewed via the calendar buttons, or using a predefined period, and then clicking the Refresh button.



5. Regardless of the range of data selected, the following summary reports will be displayed:

  1. Key Metrics: A summary of intergral policy totals, this includes the total number of; outbound messages, unique senders, messages that triggered policy, senders that triggered policy, and encrypted messages.
  2. Total Outbound vs. Flagged Policies: A line graph visualizing the total oubound mail versus flagged policies in the data range.
  3. Risk Level of Flagged Policies: A pie chart based on the assigned risk levels associated with admin defined policies.
  4. Top Flagged Policies: A bar graph showcasing the most frequently flagged policies.
  5. Top Expressions that Flagged Policies: A bar graph showing the regualrity of expressions (email, keywords, regex).
  6. Top Senders Who Flagged Policies: Another bar graph listing the senders with the highest policy trigger numbers.

If the data appears askew, or isn't presenting a useful data set that could enchance security and mail encryption, the reporting features of email policies should be examined. Creating additional policies, email lists, and keyword/dictionaies to augment existing policy, or further scrutinize highly flagged items will help differentate data, and improve security. 



What Is Next?

Create Mail Policies,

Mail Keywords & Conditionals,

View Detailed Reports.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


Please sign in to leave a comment.