Go to Insights where you can view targeted users and incident sources for the last seven days in the Threat Surface Report.


You can select targeted users and drill down to the sources of the attack, which can help you identify patterns in malicious attacks. For example, you can see if a phishing email has been sent to all users or if it has been sent to a particular group, such as C-Suite executives. You can also determine if only one user has been targeted in what might be a spear phishing attack.

The following definitions are useful as you consider the data:

For a more high-level view of phishing activity, see the Summary Report, which provides a list of the top targeted users and incident sources.

  • Date Range

  • Targeted Users Table

    The Who Attacked Who? table automatically update with the results.

  • Who Attacked Who? Table