Skip to content

Commit dd776fa

Browse files
authored
Update Get-MailTrafficReport.md
1 parent d41763a commit dd776fa

File tree

1 file changed

+19
-3
lines changed

1 file changed

+19
-3
lines changed

exchange/exchange-ps/exchange/reporting/Get-MailTrafficReport.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,25 @@ You can use the EventTypes values from the Get-MailTrafficReport cmdlet to analy
4343

4444
Mail traffic summary
4545

46+
- AdvancedProtectionMalware: Messages that were marked as malware by the Office 365 Advanced Threat Protection service. For details about the Advanced Threat Protection service, see [Office 365 Advanced Threat Protection service description](https://docs.microsoft.com/office365/servicedescriptions/office-365-advanced-threat-protection-service-description).
47+
48+
- AtpGoodMail: Messages that were delivered after passing through the Office 365 Advanced Threat Protection service. This count shows the number of unique messages. If a message was delivered to multiple recipients, it would still count as a single message.
49+
50+
- DLPMessages: Messages that matched a data loss prevention (DLP) policy. For details about data loss prevention, see [Overview of data loss prevention](https://docs.microsoft.com/microsoft-365/compliance/data-loss-prevention-policies).
51+
52+
- Expire: Messages that cannot be delivered, stuck in a queue, and after some time expired.
53+
4654
- GoodMail: Messages that were delivered after passing through the malware and spam filters. This count shows the number of unique messages. If a message was delivered to multiple recipients, it would still count as a single message.
4755

4856
- Malware: Messages that were marked as malware.
4957

50-
- TransportRuleHits: Messages that matched a rule. If a message matched multiple rules, this event type would show each of the rule matches.
58+
- Receive: Messages successfully received by the service.
5159

52-
- EncryptionManual: Messages manually encrypted by users.
60+
- SpoofMail: Messages that were marked as spoofed by the Office 365 anti-spoofing protection.
5361

54-
- EncryptionPolicy: Messages that matched a rule for encrypting email messages using the latest Office 365 Message Encryption (OME) capabilities.
62+
- TransportRuleHits: Messages that matched a transport rule. If a message matched multiple rules, this event type would show each of the rule matches.
63+
64+
- TransportRuleMessages: Messages that matched a transport rule. If a message matched multiple rules, this event type would show each of the rule matches.
5565

5666
Spam detections
5767

@@ -101,6 +111,12 @@ Bulk mail
101111

102112
- BCL1 through BCL9: Messages with BCL rating of 1 through 9.
103113

114+
Encryption
115+
116+
- EncryptionManual: Messages manually encrypted by users.
117+
118+
- EncryptionPolicy: Messages that matched a rule for encrypting email messages using the latest Office 365 Message Encryption (OME) capabilities.
119+
104120
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/exchange-server/find-exchange-cmdlet-permissions).
105121

106122
## EXAMPLES

0 commit comments

Comments
 (0)