Cloud App Security Administration Guide for Office 365
- Cloud App Security
- Understanding Cloud App Security
- Configuring Cloud App Security
- Managing Quarantine for Office 365 and Microsoft 365
- Setting Up a Quarantine Mailbox for Office 365 and Microsoft 365 Email (Exchange Online)
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 OneDrive
- Setting Up a Quarantine Folder for Office 365 and Microsoft 365 SharePoint
- Using the Quarantine View for Office 365 and Microsoft 365 Email (Exchange Online)
- Using the Quarantine Page
- Using the Quarantined File Creator Dashboard
- Using the User Dashboard for Office 365 and Microsoft 365
- Managing Restore Requests
- Using the SonicWall Cloud App Security Dashboard
- Managing Security Events
- Managing Policies
- Understanding Cloud App Security Policies
- Creating New Policy Rules
- Stopping Policy Rules
- Removing Policy Rules
- Managing Office 365 and Microsoft 365 (Exchange Online) Mail-Flow Rules
- Managing Spam and Anti-Phishing
- Managing Spam
- Managing User-Reported Phishing
- Customizing Warning Messages
- Managing Nickname Impersonation
- Managing the Anti-Phishing Exceptions
- Using the Mail Explorer
- Working with Office 365 and Microsoft 365 Email Encryption
- Configuring and Using Click-Time Protection
- Using Cloud App Security Analytics
- Configuring Cloud Applications in the Cloud App Store
- Managing Security Applications in the Security App Store
- Managing Anomaly Exceptions
- Managing Security Tool Exceptions
- Using the System Log
- Managing Cloud App Security Licenses
- SonicWall Support
Viewing and Acting on Security Events
The Security Events table lists all of the security events for your secured cloud applications. You can be filter what is displayed in this in several ways.
Security Events Filters | Description |
---|---|
Date | Timeframe during the security events occurred: previous 60 minutes, 24 hours, 7 days, 30 days, or 12 months. |
State | State of the security events: these can be new events, remediated events, exceptions, or dismissed events. |
Type | Security types: DLP, Malware, Malicious, Phishing, Anomaly, Suspicious, Shadow IT, Alert, or Spam. |
Severity Level | Severity level of the security events: Critical, High, Medium, Low, or Lowest. |
SaaS | All active cloud applications (Office 365 Emails, Gmail, etc.) |
Tool | Tool that identified the threat (Anti-phishing, DLP, Advanced Threat Protection) |
Search | Search for specific events based on the information available for the events. |
Group Actions | Take action on a selection group of security events. |
The active filters are displayed above the data listed in the table. Displayed on the far right is the total number of security events that match the filtering criteria.
Was This Article Helpful?
Help us to improve our support portal