Skip to content

Commit d1c8602

Browse files
authored
Merge pull request MicrosoftDocs#4974 from dariomws306/patch-101
Added missed EventTypes descriptions to Get-MailTrafficReport.md
2 parents 083e8c3 + e806892 commit d1c8602

File tree

1 file changed

+19
-3
lines changed

1 file changed

+19
-3
lines changed

exchange/exchange-ps/exchange/reporting/Get-MailTrafficReport.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -46,15 +46,25 @@ You can use the EventTypes values from the Get-MailTrafficReport cmdlet to analy
4646

4747
Mail traffic summary
4848

49+
- AdvancedProtectionMalware: Messages that were marked as malware by the Office 365 Advanced Threat Protection service. For details about the Advanced Threat Protection service, see [Office 365 Advanced Threat Protection service description](https://docs.microsoft.com/office365/servicedescriptions/office-365-advanced-threat-protection-service-description).
50+
51+
- AtpGoodMail: Messages that were delivered after passing through the Office 365 Advanced Threat Protection service. This count shows the number of unique messages. If a message was delivered to multiple recipients, it would still count as a single message.
52+
53+
- DLPMessages: Messages that matched a data loss prevention (DLP) policy. For details about data loss prevention, see [Overview of data loss prevention](https://docs.microsoft.com/microsoft-365/compliance/data-loss-prevention-policies).
54+
55+
- Expire: Messages that cannot be delivered, stuck in a queue, and after some time expired.
56+
4957
- GoodMail: Messages that were delivered after passing through the malware and spam filters. This count shows the number of unique messages. If a message was delivered to multiple recipients, it would still count as a single message.
5058

5159
- Malware: Messages that were marked as malware.
5260

53-
- TransportRuleHits: Messages that matched a rule. If a message matched multiple rules, this event type would show each of the rule matches.
61+
- Receive: Messages successfully received by the service.
5462

55-
- EncryptionManual: Messages manually encrypted by users.
63+
- SpoofMail: Messages that were marked as spoofed by the Office 365 anti-spoofing protection.
5664

57-
- EncryptionPolicy: Messages that matched a rule for encrypting email messages using the latest Office 365 Message Encryption (OME) capabilities.
65+
- TransportRuleHits: Messages that matched a transport rule. If a message matched multiple rules, this event type would show each of the rule matches.
66+
67+
- TransportRuleMessages: Messages that matched a transport rule. If a message matched multiple rules, this event type would show each of the rule matches.
5868

5969
Spam detections
6070

@@ -104,6 +114,12 @@ Bulk mail
104114

105115
- BCL1 through BCL9: Messages with BCL rating of 1 through 9.
106116

117+
Encryption
118+
119+
- EncryptionManual: Messages manually encrypted by users.
120+
121+
- EncryptionPolicy: Messages that matched a rule for encrypting email messages using the latest Office 365 Message Encryption (OME) capabilities.
122+
107123
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/exchange-server/find-exchange-cmdlet-permissions).
108124

109125
## EXAMPLES

0 commit comments

Comments
 (0)